Shaarli export of all bookmarks on Mon, 29 Oct 18 01:33:45 -0400
- How to properly deactivate a user in Office 365 and SharePoint - SharePoint Maven
- TrueCrypt is dead, long live VeraCrypt
- Monitoring database health and behavior: Which metrics matter? | Opensource.com
- Your First Java Program in the Ubuntu Terminal
- How to install and run the Maltrail detection system on Ubuntu Server 18.04 - TechRepublic
- HiDPI on dual 4K monitors with Linux | Vincent Bernat
- Oracle Moves to Gen 2 Cloud, Promising More Automation and Security
- Bridging State-level Cybersecurity Resources - Lawfare
- A Deepening U.S.-China Cybersecurity Dilemma - Lawfare
- City lights - Japan Today
- Why Do Some Schools Ban Halloween? - Law and Daily Life
- Over the rainbow - Japan Today
- How to Prepare Your Money for the Coming Economic Slowdown
- How to configure PXE network booting for Kali Linux | Sebastian Neef - 0day.work
- Press Announcements > Statement from FDA Commissioner Scott Gottlieb, M.D. on FDA’s efforts to strengthen the agency’s medical device cybersecurity program as part of its mission to protect patients
- New libssh Vulnerability – No Logo But Plenty Of Attention
- Automatically splitting, cropping and rotating multiple photos from a combined scan | stewart a.
- My Money Blog Portfolio Income – October 2018 — My Money Blog
- Michael Pollan says that you can sum up his eating advice as “Eat food, not too much, mostly plants.” You can sum up my thoughts on portfolio income as “Spend mostly dividends and interest. Don’t eat too much principal.”
- NBlog - the NoticeBored blog: NBlog Oct 13 - little boxes, little boxes
- NBlog - the NoticeBored blog: NBlog Oct 9 - ten top infosec books
- Supply Chain Security 101: An Expert’s View — Krebs on Security
- How Office 365 learned to reel in phish - Microsoft Secure
- CISO series: Building a security-minded culture starts with talking to business managers - Microsoft Secure
- Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File - KitPloit - PenTest Tools for your Security Arsenal ☣
- CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs - KitPloit - PenTest Tools for your Security Arsenal ☣
- Survey: 75 percent of US employees display insufficient cyber knowledge
- Perspective: The periodic table of data privacy
- Sen. Warner discusses America's failure to lead in cybersecurity
- UK Cyberattack Investigations: An Analysis - HealthcareInfoSecurity
- Meterpreter File System Commands Cheatsheet
- HHS Updates Security Risk Assessment Tool - HealthcareInfoSecurity
- From Canada to Argentina, Security Researchers Have Rights—Our New Report | Electronic Frontier Foundation
- Google Online Security Blog: Modernizing Transport Security
- Errata Security: Notes on the UK IoT cybersec "Code of Practice"
- Maintaining a Pulse: Ransomware in the Healthcare Sector - The Ethical Hacker Network
- FICO & US Chamber of Commerce Score Cyber-Risk ...
- SEC Warns Public Companies on Accounting Control Use
- The Cybersecurity Hiring Gap is Due to The Lack of Entry-level Positions - Daniel Miessler
- 6 Reasons Why Employees Violate Security Policies
- Medical Device Security and CIO Insomnia ~ Cyber Thoughts
- Ransomware attack hit North Carolina water utility following hurricane | CSO Online
- The Cybersecurity Culture Gap
- ERP Applications Under Fire Report | Onapsis
- NVMe: A cheat sheet - TechRepublic
- Open Source Healthcare | opensourcehealthcare
- Raspberry Pi based garden monitoring system supplies five sensors
- Microsoft browsers will disable 20-year-old security protocol
- MIT's AI can identify breast cancer risk as reliably as a radiologist
- Proposal for a Cyber-International Committee of the Red Cross - Lawfare
- Summary: GAO Report on Weapons System Cybersecurity - Lawfare
- Free NFR Keys for KMS from Hytrust for all VMware vExperts | ESX Virtualization
- VMware vSphere 6.5 - VM Encryption Details | ESX Virtualization
- draft-ietf-opsec-v6-13 - Operational Security Considerations for IPv6 Networks
- CCNA Training » AAA TACACS+ and RADIUS Tutorial
- To which release should you upgrade to? Plus: Extended Support?
- Yes, SQL*Loader is Faster at Loading Records | ThatJeffSmith
- Modeling JSON in Oracle Database Tables, Part 2 | ThatJeffSmith
- New – Managed Databases for Amazon Lightsail | AWS News Blog
- My Top 10 PowerShell Tips & Tricks – Virtually Sober
- Free Tool - HammerDB Benchmark Tool New Release | ESX Virtualization
- IAM Identities Basics and Best Practices
- AWS IAM Policy Explained
- Amazon S3 Security Part 1: S3 Access Control Tools
- Getting started with Red Hat Satellite – Initial configuration - Blog dbi services
- Google AI can spot advanced breast cancer more effectively than humans
- FOSS LinuxBoot replaces UEFI on servers | Born's Tech and Windows World
- WannaCry Ransomware attack costs £92 million - IT Governance Blog
- The most recent Servicing Stack Updates @ AskWoody
- Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc - KitPloit - PenTest Tools for your Security Arsenal ☣
- Report: Remote Access Is No. 1 Healthcare Tech Hazard
- Live Webinar: Five Steps to Masterminding an Effective Security Awareness ProgramWebinar.
- US Senators ask India's PM to rethink strict data localization plans
- VCDX - Mock Design - How to attack it?! -
- Medtronic Cardiac Devices Recalled Due to Cyber Concerns
- The Feet of the Masters: Lessons on Irregular Cyber Warfare | Small Wars Journal
- Getting started with Red Hat Satellite - Installation - Blog dbi services
- How to do great work ~ Get Rich Slowly
- Security Is Bananas | The Networking Nerd
- Getting started with Minikube: Kubernetes on your laptop | Opensource.com
- Doc Searls Weblog · Toward no longer running naked through the digital world
- What is the latest version of Wi-Fi? – lakkireddymadhu
- The cost of a data breach - IT Governance Blog
- How Cyber Essentials can help secure your devices and software - IT Governance Blog
- 5 alerting and visualization tools for sysadmins | Opensource.com
- From DNSAdmins to Domain Admin, When DNSAdmins is More than Just DNS Administration – Active Directory Security
- HHS OIG Launches Cybersecurity Web Page - HealthcareInfoSecurity
- Hardware, firmware and drivers | Adventures in a Virtual World
- Life is dirty. So is your data. Get used to it. - Thomas LaRock
- Ransomware: Keep Safe and Stay Safe
- Understanding the privacy paradox
- NIST and the Small Business: Addressing Cyber Insecurity
- Top cybersecurity facts, figures and statistics for 2018 | CSO Online
- CCNA Training » OSI TCP/IP Model Questions
- Counterintelligence Implications of Artificial Intelligence—Part III - Lawfare
- Artificial Intelligence – A Counterintelligence Perspective: Part I - Lawfare
- (My) BruCON 2018 Notes – Adventures in the programming jungle
- CCNA Training » Basic MPLS Tutorial
- PiCluster 2.4 is out! | Linux-toys.com
- Linus' Behavior and the Kernel Development Community | Linux Journal
- Sell Me on Oracle SQLcl in 50 Seconds | ThatJeffSmith
- Report: US weapons systems are highly vulnerable to cyber attacks
- CTIA - Wireless Industry Announces New Cybersecurity Certification Program for Cellular-Connected IoT Devices
- Apache Struts v3 - Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts - KitPloit - PenTest Tools for your Security Arsenal ☣
- Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms - KitPloit - PenTest Tools for your Security Arsenal ☣
- Laforge - Security Competition Infrastructure Automation Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to Protect Against Software Supply Chain Attacks | OPSWAT
- The Why of Security | The Networking Nerd
- Mail Security Tester - A Testing Framework For Mail Security And Filtering Solutions - KitPloit - PenTest Tools for your Security Arsenal ☣
- NTT Data plans to develop AI-backed diagnosis service globally - Japan Today
- How to Change/Spoof a MAC Address in Ubuntu
- 20 Red Hat Clustering (Pacemaker) Interview Questions and Answers
- Starting Points & Ideas for your Arduino STEM Curriculum | Underwater Arduino Data Loggers
- USBHarpoon a look-like charging cable that can hack into your computerSecurity Affairs
- USBHarpoon
- Colection of Opensource Project – it…'s Notes
- 50 Funny Wi-Fi Names for Your Router's Network SSID
- How to report a data breach to the ICO - IT Governance Blog
- Vizio to pay $17M to settle privacy class-action
- GAO Report shed the lights on the failures behind the Equifax hackSecurity Affairs
- Embracing Cybersecurity Best Practices, No Matter Where You Are
- 7 Steps to Start Your Risk Assessment
- (My) BruCON 2018 Notes (Retro Day) – Adventures in the programming jungle
- 6 ways your organisation can suffer a data breach – IT Governance Blog
- Zero Trust Security Architectures - Akamai's Approach - Security Boulevard
- Seven Signs of a Strong Security Culture - Security Boulevard
- From my Gartner Blog - Endpoint Has Won, Why Bother With NTA? - Security Boulevard
- The Origin of Ransomware and Its Impact on Businesses | Radware Blog
- Vulnerability Scanning vs. Penetration Testing: What's the Difference?
- OWASP Top 10 Security Risks – Part I - Security Boulevard
- Health Data Breach Victim Tally for 2018 Soars
- 6 Ways to Use CloudTrail to Improve AWS Security
- Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
- Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
- Open FAIR Complements Risk Management Programs | Security Architects Partners
- Equifax Breach: Key Lessons Learned - HealthcareInfoSecurity
- Breach Notification: Canada Prepares for Nov. 1
- The FDA’s New Digital Health Cyber Unit: What Would It Do?
- Facebook Submits GDPR Breach Notification to Irish Watchdog
- FDA Reveals Steps to Bolster Medical Device Cybersecurity
- Critical Elements of a Solid Cybersecurity Program
- Responding to Ransomware Attacks: Critical Elements
- The SQL Server Defensive Dozen Part 1 – Hardening SQL Network Components – SQL Server Cybersecurity
- The SQL Server Defensive Dozen – Part 3: Authentication and Authorization in SQL Server – SQL Server Cybersecurity
- Measuring Model Goodness – Part 1 | Developing Analytics Solutions with the Data & AI Global Practice
- Add a Staff Notebook to Microsoft Teams – SharePoint Steve
- Long Before Facebook, The KGB Spread Fake News About AIDS : NPR
- Reality Winner Sentenced To 5 Years, 3 Months For Leaking Classified Info : NPR
- Getting Over Your Ex: Can Brain Science Help Heartbreak? : Shots - Health News : NPR
- USB threats from malware to miners - Securelist
- DeepSec 2018 Talk: Uncovering Vulnerabilities in Secure Coding Guidelines - Fernando Arnaboldi •
- ABC Film Crews Leave Hospitals on the Hook for HIPAA Fines
- Unsecure RDP Connections are a Widespread Security Failure | Webroot
- Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV - Microsoft Secure
- GDPR Report Card: Some Early Gains but More Work Ahead
- Securing connected medical devices: Will categorizing them as ICS help? | CSO Online
- Mobile CI/CD 101 – Visual Studio App Center Blog
- 2018 State of DevOps Report
- U.S. Air Force awards $30M+ Enterprise IT-as-a-Service contract to Microsoft – Microsoft Azure Government
- Design considerations for hybrid applications – Security – AzureCAT Guidance
- Microsoft Security Code Analysis (Private Preview) – Microsoft Faculty Connection
- Secure development on Azure Government – Part 1 – Microsoft Azure Government
- Real-time performance monitoring for Azure SQL Database Managed Instance | SQL Server Customer Advisory Team
- Sans Forgetica: the font that could help you remember
- Why You Shouldn't Discount Discount Cloud Services Part 2 | Tallan's Blog
- SNIP 5 - HIPAA External Code Set Testing | Tallan's Blog
- All sorts of bad things happen when we disable the Task Scheduler service, is that bad? – The Old New Thing
- What Is "Five Eyes" Surveillance? VPN Users, Beware!
- How one student’s open source journey lead her to help create ChRIS
- Why TENS is the secure bootable Linux you need - TechRepublic
- Key Takeaways from Business of Software USA 2018
- China reportedly carried out a 'hardware hack' on Apple and Amazon
- Publish or Perish: The Sad Genius of Ignaz Semmelweis | Hackaday
- Ignaz Semmelweis
- How to monitor your data center Linux server with osquery - TechRepublic
- How to measure DevOps success | Opensource.com
- Intro to Docker: Why and How to Use Containers on Any System | Hackaday
- The DIN Rail and How It Got That Way | Hackaday
- DSHR's Blog: Brief Talk At Internet Archive Event
- Low-cost USB Rubber Ducky pen-test tool for $3 using Digispark and Duck2Spark
- Exploring an Abandoned Toys “R” Us | Hackaday
- Hack My House: Raspberry Pi as Infrastructure | Hackaday
- Sea of red - Japan Today
- Terence Luk: Attempting to boot a VMware vSphere virtual machine fails with the error status: 0xc0000017
- 0xc0000017
- Leaf-and-Spine Fabric Myths (Part 1) « ipSpace.net blog
- Passed Microsoft Certified: Azure Administrator - Thomas Maurer
- How Etsy Handles Peeking in A/B Testing - Code as Craft
- Why privacy compliance matters to a company’s valuation
- What might a GDPR cease-processing order look like?
- Under GDPR, large-scale data processing is considered ‘high risk’
- Drafting a GDPR-compliant retention policy
- Spain's decree-law temporarily adapting legislation to GDPR
- Italy's GDPR implementation law goes into effect today
- What could Canada learn from the GDPR?
- How local laws helped a company prepare for GDPR
- A practitioner's look at Belgium's GDPR implementation law
- CNIL looks at GDPR four months later
- Security incident involved in SingHealth data breach never reported
- Study: Health care data breaches rising yearly
- Medical Device Cybersecurity: Regional Incident Preparedness and Response Playbook - pr-18-1550-Medical-Device-Cybersecurity-Playbook.pdf
- Alabama Gov. Kay Ivey announces state's first security operations center
- Calif. signs first IoT security bill into law
- AT&T CEO calls for federal US privacy law
- Victory! California Passes Net Neutrality Bill | Electronic Frontier Foundation
- 8 Attack Vectors Puncturing Cloud Environments
- Vermont’s New Data Privacy Law | Electronic Frontier Foundation
- Owning Security in the Industrial Internet of Things
- The Cyber Kill Chain Gets a Makeover
- 6 Security Training Hacks to Increase Cyber IQ Org-Wide
- Troy Hunt: New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change
- Managing Data the Way We Manage Money
- 4 Traits of a Cyber-Resilient Culture
- CISOs: How to Answer the 5 Questions Boards Will ...
- New Book: The Culture of Learning | Don Jones
- DSHR's Blog: Vint Cerf on Traceability
- Robert Milkowski's blog: Solaris: Spectre v2 & Meltdown fixes
- History of Lisp | Lambda the Ultimate
- AMA: How can I start using .NET Framework in PowerShell? | Don Jones
- Upcoming Webinar: A Farewell to LUNs – Discover how VVols forever changes storage in vSphere » Welcome to vSphere-land!
- CVE Funding and Process | Emergent Chaos
- Ease Me Into Cryptography Part 1: Buzzwords and Hash Function - The Ethical Hacker Network
- Container Security Part 3 – Kubernetes Cheat Sheet - The Ethical Hacker Network
- DoD RMF Part 1: How We Got to the RMF - The Ethical Hacker Network
- Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 2 ~ Cyber Thoughts
- Patient Safety and Cyber Risk ~ Cyber Thoughts
- Preparing to Release the OWASP IoT Top 10 2018 - Daniel Miessler
- The Sony hacker indictment: 5 lessons for IT security | CSO Online
- Facebook security and privacy issues revealed | CSO Online
- The best password advice right now | CSO Online
- Basic Cyber Hygiene Practices That Go a Long Way | CSO Online
- Gwinnett Medical Center investigating possible data breach | CSO Online
- David Chung's SDDC in a box uses 4 Xeon D nodes for vSAN, is relatively quiet, and fits in carry-on! | TinkerTry IT @ Home
- Violin Systems Announces Violin XVS 8 | PenguinPunk.net
- Ansible - Don't be Afraid of a Little Python · Lindsay Hill
- Testing Performance on vSAN — ThinkCharles.net
- Now Available – Amazon EC2 High Memory Instances with 6, 9, and 12 TB of Memory, Perfect for SAP HANA | AWS News Blog
- New Oracle Database Upgrade Lab for Oracle 18.3.0
- Swap space on Linux systems: A primer | Opensource.com
- iTWire - Equifax penalised $3.5m for consumer law breaches
- What's Your System's Uptime? | Linux Journal
- Computer Science (CS) and Information Technology (IT): Part 2 | APMdigest - Application Performance Management
- Computer Science (CS) and Information Technology (IT): Part 1 | APMdigest - Application Performance Management
- Four best practices that can ensure application health in an Hybrid IT environment! (by Will Moonen)
- Windows Server 2019 Windows Defender Advanced Threat Protection - Thomas Maurer
- GitHub - carlbuchmann/iac-dev: Infrastructure as Code development Workstation: RedHat/Centos or Debian/Ubuntu
- The 2018 DOD Cyber Strategy: Understanding 'Defense Forward' in Light of the NDAA and PPD-20 Changes - Lawfare
- Windows ALPC vulnerability (CVE-2018-8440) used in Exploit Kit | Born's Tech and Windows World
- 16 iptables tips and tricks for sysadmins | Opensource.com
- Patch Lady – 31 days of paranoia – day 1 @ AskWoody
- October the 1st, a historic day | Born's Tech and Windows World
- Windows Server 2019 Evaluation and Security Baseline Draft | Born's Tech and Windows World
- A new triple constraint – Blog FiascoBlog Fiasco
- Essential System Tools: ps_mem - accurately report memory usage of programs - LinuxLinks
- Open-source alt-droid wants to know if it's still leaking data to Google • The Register
- Download our GIMP cheat sheet | Opensource.com
- Siemens Issues An Oktoberfest Release Of Jailhouse 0.10 Hypervisor - Phoronix
- A Fond Farewell and Tribute to Former Low End Mac Writer Charles W. Moore | Low End Mac
- Announcing Oracle Solaris 11.4 SRU1 | Oracle Solaris Blog
- 3 open source distributed tracing tools | Opensource.com
- Low cost and open source Serial to Ethernet WIZ750SR, WIZ752SR Series | Elektor Magazine
- Why Nerds Use Linux - LinuxAndUbuntu - Linux News | FOSS Reviews | Linux Tutorials HowTo
- Aging like milk, not wine: The realities of container security
- What containers can teach us about DevOps | Opensource.com
- DHS Awards GrammaTech $3.5M to Modernize Open-Source Software Analysis Tools
- The rise of open source use across state and local government -- GCN
- Open Source Software & Usability: Open source tools I used to write my latest book
- webhint: a hinting engine for the web – webhint – Medium
- Cybersecurity Remains an Uphill Battle, New Research Shows
- The 10,000 Hour Rule Is Wrong. How to Really Master a Skill
- Millions of unfixed security flaws is a lie – Open Source Security
- How to install SOPlanning on Ubuntu 18.04 LTS
- Understanding Bash: Elements of Programming | Linux Journal
- How Azure Sphere ensures IoT security within a 4MB Linux stack
- Weekend Reading: Containers | Linux Journal
- Taskbook - Command Line-Based Tasks, Boards, and Notes
- French cybersecurity agency open sources security hardened CLIP OS - Help Net Security
- How to Test Network Throughput Using iperf3 Tool in Linux
- Oracle Launches Java 11, Adding Security Features
- List of 80,000 Hours content from the last 4 months, summary of which were most popular, and plans for future releases. - 80,000 Hours
- 10 handy Bash aliases for Linux | Opensource.com
- 10 Body Language Mistakes That Sabotage Job Interviews
- Infographic: Average Auto Insurance Premiums For All 50 States — My Money Blog
- The history of VMware vSphere | VM Spot
- Security Features Check – AMTSO
- EICAR – The Most Common False Positive in the World | Webroot
- Credit Freezes are Free: Let the Ice Age Begin — Krebs on Security
- From Kekeo to Rubeus – harmj0y
- CVE-2018-5240 – Symantec Management Agent (Altiris) Privilege Escalation
- Multiple Ways to Secure SSH Port
- JPCERT/CC Blog: Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch-
- How to Install and Configure Apache Tomcat 9 in CentOS
- Evil Tester: What If Courage was Contagious?
- My Experience with the DoD Version of the RMF - The Ethical Hacker Network
- Hunting for Suspicious Processes with OSSEC - SANS Internet Storm Center
- ModSecurity and nginx | Linux Journal
- Security Flaw Found In Microsoft JET Database Engine by ZDE - Patch Expected In Windows October Update - Appuals.com
- Configuring Name Protection on a DHCP Server to Prevent Name Squatting | Alexander's Blog
- 6 steps for building a robust incident response plan | CSO Online
- 5 cyber security basics you can't afford to ignore | CSO Online
- Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 1 ~ Cyber Thoughts
- (My) OWASP Belgium Chapter meeting notes – Adventures in the programming jungle
- New – Parallel Query for Amazon Aurora | AWS News Blog
- Postman is Awesome – Stuff I'm Up To
- The Cause of Every Deadlock in SQL Server - Thomas LaRock
- Apache NiFi: From Syslog to Elasticsearch – David Vassallo's Blog
- The top cybersecurity concerns for IT and business
- Cisco Firewall Port Forwarding | PeteNetLive
- Four Things to Consider Before You Move Everything to the Cloud (by Keith Bromley)
- Kubernetes Network Policies Using Cilium - Controlling Ingress/Egress from Namespaces — Cilium
- Identity Management for Systems in a DMZ
- Linking Docker containers | geekdudes
- Equifax One Year Later: What Lessons Have Been Learned?
- GAO-18-559, DATA PROTECTION: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach - 694158.pdf
- How to Create Python Virtual Environments on Ubuntu 18.04 | Linuxize
- State Department Still Sucks At Basic Cybersecurity And Senators Want To Know Why | Techdirt
- Writing More Compact Bash Code | Linux Journal
- Distributed tracing in a microservices world | Opensource.com
- Linux firewalls: What you need to know about iptables and firewalld | Opensource.com
- 16 Useful Bandwidth Monitoring Tools to Analyze Network Usage in Linux
- Oracle 12.2 : Windows Virtual Account - Blog dbi services
- Weekend Reading: Scary Tales from the Server Room | Linux Journal
- How To Enable TLS 1.3 in Nginx on Ubuntu 18.04 and 16.04 - LinuxBabe
- A Detailed Look at RFC 8446 (a.k.a. TLS 1.3)
- New Xbash Malware Is A Deadly Combo Of Ransomware, Botnet, Cryptominer
- Creating a custom Windows image for MaaS – Azure Field Notes Blog
- Openshift 3.5 installation headaches (and where to find the aspirin) – Azure Field Notes Blog
- National Cyber Strategy
- The Pentagon’s New Cyber Strategy: Defend Forward - Lawfare
- How to Use Get-Log for Parsing Logs
- Not all PowerShell shells are equals | >_
- New – AWS Storage Gateway Hardware Appliance | AWS News Blog
- The Economics of Stock Buybacks | Tax Foundation
- EternalBlue Infections Persist
- EternalBlue
- The 7 Habits of Highly Effective Security Teams
- New GandCrab ransomware variant hammers Florida school district | CSO Online
- GandCrab
- 5 steps to create a zero trust security model | CSO Online
- Hardening Windows – Stuff I'm Up To
- Offline Update Page Details (Nessus)
- Wholesale domain names, SSL Certificates, Hosted Email - OpenSRS
- Have Microsoft patches reached a painful tipping point?
- Blog, Hacking NASL Scripts- DigiNinja
- GitHub - tenable/notepadpp-nasl
- GitHub - tenable/nasldoc: A documentation generator for NASL.
- Fast comparison of Nessus and OpenVAS knowledge bases | Alexander V. Leonov
- PCI DSS: Lessons to learn from recent payment card breaches – IT Governance Blog
- Errata Security: Provisioning a headless Raspberry Pi
- Errata Security: California's bad IoT law
- Installing OpenVAS on CentOS 7 - Linux Included
- Experts Urge Rapid Patching of ‘Struts’ Bug — Krebs on Security
- An Open Letter To Ransomware Authors - Linux Included
- Presentation - HL7 Insecurities - Linux Included
- Container Security Part 2 - Benchmarks to the Rescue - The Ethical Hacker Network
- Automating DAST Scans with Jenkins, Arachni & ThreadFix - Sustainable Application SecuritySustainable Application Security
- Globbing and Regex: So Similar, So Different | Linux Journal
- WPScan - A Black Box WordPress Vulnerability Scanner
- Lync Troubleshooting: There was a problem acquiring a personal certificate required to sign in. If the problem continues, please contact your support team. - TechNet Articles - United States (English) - TechNet Wiki
- Rediscovering F-Droid – Exotic Security
- What is DNS and how it works – lakkireddymadhu
- DNS Terminology – lakkireddymadhu
- Developing Cyber Security Incident Response Plans for Industrial Control Systems - Delta Risk
- How Technology Increases Production Without the Need for Humans - Daniel Miessler
- Stop Trying to Violently Separate Privacy and Security - Daniel Miessler
- Stop Unwanted and Annoying Phone Calls | Verizon Phone Support
- Habits of a Successful Business Executive that You Must Know
- How I Reduced My Spam Phone Calls by 90% - Daniel Miessler
- 7 Trends in Docker Container Monitoring | APMdigest - Application Performance Management
- The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 2 | APMdigest - Application Performance Management
- The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 1 | APMdigest - Application Performance Management
- I Lost 50 pounds in 5 Months, Here’s How - Thomas LaRock
- FAQs for VeriSM | Purple Griffon
- 10 reasons to take your ITIL training now rather | Purple Gr...
- ITIL4® - what’s happening, what’s new and what w | Purple Gr...
- The No Budget Admin: De-Mystifying and Installing Orace Java for Linux
- How I Tricked Myself into Shipping Too Late - mtlynch.io
- Keeping a particular version of a package in Red Hat Enterprise Linux | setaOffice
- MPECS Inc. Blog: Security: RBC Royal Bank: Best laid plans of mice and men
- MPECS Inc. Blog: Legacy Windows XP for Industrial Machine Access and Management and Accounting Apps
- List Global Assembly Cache using PowerShell – PowerShell, Programming and DevOps
- 2018 DerbyCon Hiring List ·
- Powershell and Lotus Notes pt2 – Luka Gros
- Mapping Network Security Resilience To The NIST Cybersecurity Framework (by Keith Bromley)
- Startup Dreams (by Paul W. Smith)
- “passionate stranger who hallucinates the future for them.”
- Troubleshooting a Spotty/Bad Internet Connection (by Chris Greer)
- PingPlotter
- Need to document your environment? Check out “As Built Report” | JonKensy.com
- Create Haskintos USB – it…'s Notes
- Using VDO on CentOS/RHEL7 for Storage Efficiency | hobo.house
- Bristol Airport affected by ransomware | Born's Tech and Windows World
- Chris's Wiki :: blog/solaris/ZFSSendRecvVsRsync
- Chris's Wiki :: blog/sysadmin/ProcmailWhatNext
- The History of a Security Hole | OS/2 Museum
- insignary
- The new Windows lifecycle fact sheet @ AskWoody
- Cross-Cloud Snapshot Management – Data Protection Hub
- California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things | Techdirt
- The Enemy Gets a Vote - Lawfare
- A Matter of Perspective | The Networking Nerd
- Agile project management: A comprehensive guide | CIO
- The principles of agile
There are 12 key principles that still guide agile project management today.
Customer satisfaction is always the highest priority and is achieved through rapid and continuous delivery.
Changing environments are embraced at any stage of the process to provide the customer with a competitive advantage.
A product or service is delivered with higher frequency.
Stakeholders and developers collaborate closely on a daily basis.
All stakeholders and team members remain motivated for optimal project outcomes, while teams are provided with all the necessary tools and support, and are trusted to accomplish project goals.
Face-to-face meetings are deemed the most efficient and effective format for project success.
A final working product is the ultimate measure of success.
Sustainable development is accomplished through agile processes whereby development teams and stakeholders are able to maintain a constant and ongoing pace.
Agility is enhanced through a continuous focus on technical excellence and proper design.
Simplicity is an essential element.
Self-organizing teams are most likely to develop the best architectures and designs and to meet requirements.
Regular intervals are used by teams to improve efficiency through fine-tuning behaviors.
- Text-editor-like weekly planner - Coypu
- Oracle Core Audit - Do you Audit your Core database engine for breach?
- Jaffar's (Mr RAC) Oracle blog: All about 'Autonomous Transaction Processing' - Part I
- A Review of Ubiquiti Wireless | The Networking Nerd
- Open-source software may aid brain imaging to find disease treatments | Health Data Management
- Injecting chaos experiments into security log pipelines | Opensource.com
- VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
- Encrypt A Drive With VeraCrypt in Linux - LinuxConfig.org
- Top 8 YUM ThirdParty Repositories for CentOS and RHEL
- Useful Tips to Improve Emulation Performance in RetroPie - Make Tech Easier
- RetroPie
- A day in the life of a log message | Opensource.com
- the xonsh shell — xonsh 0.7.8 documentation
- Tanium - Endpoint Security and Systems Management
- How a Unique Business Model and Hiring Strategy Brought the Garrett Companies to $82 Million in Just 3 Years | Inc.com
- Linux namei Command Tutorial for Beginners (5 Examples)
- Introduction to python web scraping and the Beautiful Soup library - LinuxConfig.org
- Know Your Storage: Block, File & Object | Linux.com | The source for Linux information
- 2 Ways to Re-run Last Executed Commands in Linux
- DSHR's Blog: What Does Data "Durability" Mean
- Slideshows - Dark Reading
- Randomize your MAC address using NetworkManager - Fedora Magazine
- Doing One Thing, Well: The UNIX Philosophy | Hackaday
- Stop Killing Your Cattle: Server Infrastructure Advice | Linux Journal
- 12 Practical Ping Command Examples for Linux Users
- The Cyberlaw Podcast: Click Here to Kill Everybody - Lawfare
- Introduction to VistA | OSEHRA
- Restoring 1000’s of SQL Server Databases Using PowerShell | Simon Osborne's SQL Blog
- Deploy vCenter Server using Ansible - Virtual Elephant
- How to Setup File Integrity Monitoring (FIM) using osquery on Linux
- 10 Must-See Museums in the U.S.
- CYBER CENTER: Cybersecurity Legal Task Force Vendor Contracting Project: Cybersecurity Checklist | Business Law Section
- 5 Unforgettable Train Trips Across the U.S.
- Oracle Database 18c "Hands-Off" Data Guard Build Using VirtualBox and Vagrant | The ORACLE-BASE Blog
- 5 Things You Didn't Know You Could do with Nmap - Daniel Miessler
- Beyond the Firewall - Different Rules for East-West Traffic | CSO Online
- Chris's Wiki :: blog/python/DjangoWeNeedTests
- Chris's Wiki :: blog/solaris/ZFSAndDirectoryDType
- Chris's Wiki :: blog/sysadmin/ManyFilesBackupProblem
- Chris's Wiki :: blog/sysadmin/QuietConfigurationDrift
- Patch Lady – Microcode confusion @ AskWoody
- Mind boggled: The Meltdown/Spectre microcode patches @ AskWoody
- Identify an AD object from the SID | Alan's Blog
- Listing (and running) OS Shell Commands with PowerShell | Alan's Blog
- Create a Hash Table with AD Domain DNS Root and NetBIOS Names | Alan's Blog
- Remove a DSC config | >_
- How do I install Guest Additions in a VirtualBox VM? - Ask Ubuntu
- About the Turkish-I Problem | >_
- Security 101 Series volume 1 -
- VMware OS Optimization Tool
- We are changing the way we name VMware certifications. The Year Makes It Clear. - VMware Education Services
- Home Lab Power Automation – Part 3 – vswitchzero
- Ansible Roles for VMware SDDC Deployments - Virtual Elephant
- Technical notes, my online memory: Scrub GPS location from JPEG EXIF data
- Trying out the Azure Firewall in a Hub & Spoke deployment model – Karim Vaes
- IRC turns 30! – Virtually Fun
- Backup Best Practices with Unsupported Databases
- Hard Drive Breakthrough in 2019? Technology Clash: HAMR vs MAMR
- Proper TempDB creation for Configuration Manager | Steve Thompson [MVP]
- Azure Site Recovery – From Start to Finish – Anthony on Azure
- Python: seven simple things network engineers need to know | Open-Source Routing and Network Simulation
- Interview: Benefits of Network Automation (Part 2) « ipSpace.net blog
- Interview: Benefits of Network Automation (Part 1) « ipSpace.net blog
- Deploy WebLogic docker images using Docker Toolbox and Virtual Box on Windows - Blog dbi services
- RV Life and Working Remote – DBA Kevlar
- Restoring a database without having any controlfile backup - Blog dbi services
- VMworld 2018 US: vSphere Platinum and other vSphere Updates – Ather Beg’s Useful Thoughts
- Cohesity – Harnessing the Power of Data – Ather Beg’s Useful Thoughts
- The Performance Hit For A Xeon-Backed Ubuntu Linux VM With L1TF / Foreshadow Patches - Phoronix
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
- Trump’s Secret Order on Pulling the Cyber Trigger - Lawfare
- Artificial Intelligence – A Counterintelligence Perspective: Part II - Lawfare
- Heterogeneous Memory Management Still Being Worked On For Nouveau / Radeon / Intel - Phoronix
- 12 of the Best Free Linux Chess Apps (Updated 2018) - LinuxLinks
- FOSS: passive consumerism kills our community | Carl Chenet's Blog
- Partitioning a 7 exabyte disk | Richard WM Jones
- Kubernetes is the new operating environment (Part 1) - RHD Blog
- This Is Your Solution For Open Source Motion Tracking | Hackaday
- A sysadmin's guide to containers | Opensource.com
- 4 Ansible playbooks you should try | Opensource.com
- 6 open source tools for making your own VPN | Opensource.com
- How to use KA Lite to serve up educational content | Opensource.com
- Essential LaTeX Tools - typeset beautifully (Updated 2018) - LinuxLinks
- VMware Goes Platinum for vSphere Virtual Server Deployments
- StingRay - simple chess graphical user interface - LinuxLinks
- Everything You Need to Know about Linux Containers, Part II: Working with Linux Containers (LXC) | Linux Journal
- 12 Best Hacking Tools Of 2018 For Windows, Linux, And OS X
- Getting started with Sensu monitoring | Opensource.com
- 12 Easy Steps to Speed Up Ubuntu Linux
- Joplin: Encrypted Open Source Note Taking And To-Do Application - Linux Uprising Blog
- Monitoring OpenVPN ports and the ways of Open Source – /home/liquidat
- Federated CI
- How to Travel Across the U.S. on a Budget
- Post-Wayfair Options for States | South Dakota v. Wayfair | Tax Foundation
- Lo Mein Noodle Salad Recipe -- Gluten Free, Vegan, Delicious, and Easy | Penniless Parenting
- Pennsylvania: A 21st Century Tax Code | Tax Foundation
- The Importance of a Well-Organized Kitchen | Penniless Parenting
- Warren Buffett Old Interview - NevBlog
- Warren Buffett on Reaching Stock Market Highs — My Money Blog
- How to get rich and stay rich ~ Get Rich Slowly
- How to Restore Files from Backblaze - TidBITS
- How a 1998 meeting with Steve Jobs gave birth to Wi-Fi | Wi-Fi NOW Events
- Lego's new toy train is a STEM tool for preschoolers
- What early retirement was like in 1957 ~ Get Rich Slowly
- All of the money books I've reviewed during the past twelve years
- My digital shadow looks nothing like me
- 'Disable SMT/Hyperthreading in all Intel BIOSes' - MARC
- Foundries.io promises standardized open source IoT device security | TechCrunch
- 5 open source tools for container security | Opensource.com
- 9 flowchart and diagramming tools for Linux | Opensource.com
- Aqua Security Releases Kube-Hunter Container Penetration Testing Tool
- Keeping patient data safe with open source tools | Opensource.com
- How to Make Your Ubuntu PC a Wireless Access Point
- Windows Server 2019 - What is coming Next - Thomas Maurer
- Configure Fine-Grained Password Policies for Specific Users in Active Directory
- Designing a Database: 7 Things You don't Want To Do
- Powershell and Lotus Notes – Luka Gros
- Sharkfest 2018 - TCP Fundamentals Part 1 (by Chris Greer)
- Everything You Need to Know about Linux Containers, Part I: Linux Control Groups and Process Isolation | Linux Journal
- Proving ROI: How a Security Road Map Can Sway the ...
- Why you should be skeptical of financial blogs ~ Get Rich Slowly
- A Convenient Guide to Project Management Courses
- Updating SSL Certificates on vCenter and Platform Services Controllers
- MikroTik Automated MPLS L3VPN Lab – neckercube.com
- The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About | CSO Online
- Homemade Gluten Free Vegan Thin Mints or Mint Chocolate Wafer Cookies Recipe -- Frugal and Easy | Penniless Parenting
- Messy Insider Breach Impacts 258,000 Over Five Year Span
- Augusta University Health Reports Major Data Breach
- Troubleshooting TLS Certificates - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Add AWS Web Application Firewall to Protect your Apps - The IT Hollow
- The Dangers in the Trump-Brennan Confrontation - Lawfare
- The Forgotten Art of Riveted Structures | Hackaday
- vCenter Server Appliance (vCSA) automated/unattended deployment - IVOBEERENS.nl
- HostsSources · AdAway/AdAway Wiki · GitHub
- Configuration Management for Windows - Stack Overflow
- DSC + Ansible – Trond's Working!
- Updated: Lanmanserver and Lanmanworkstation Tuning
- Configuration in a DevOps world – Windows PowerShell Desired State Configuration | PowerShell Team Blog
- Introducing PowerShell Desired State Configuration (DSC) | Building Clouds
- Under The Stairs: Events in the Security Event Log
- Vulnerability Disclosure Policy Basics: 5 Critical Components | HackerOne
- Updating CTL's in disconnected environments in Windows - ITS ALL ABOUT MICROSOFT WINDOWS CLIENT, SERVERS AND MUCH MORE
- Using Wasabi S3 Object Storage with containers
- Otter | Provision your Servers and Manage Configuration | Inedo
- OpenControl
- Cloud-A - True Canadian Cloud for Development TeamsCanadian Cloud Infrastructure | True Cloud
- US bans government personnel from using Huawei and ZTE devices
- Keiretsu Safe Haven Fading For Mitsubishi Heavy Industries (TSE: 7011) - Kenkyo Investing
- The Benefits of Automating Web Application Vulnerability Scanning | Netsparker
- røøtz Asylum
- nikon photography
- Servers for Hackers
- So You Got Yourself a Loadbalancer | Servers for Hackers
- 1. OWASP_develope_secure_software_with_OWASP20180621 - 1. OWASP_develope_secure_software_with_OWASP20180621.pdf
- OWASP Defect Dojo
- Health care industry is king of the malicious insider threat
- Reinforcement Learning and AI - Data Science Central
- What's hot in AI: Deep reinforcement learning | VentureBeat
- Understanding Get-SpeculationControlSettings PowerShell script output
- Heads Up: Enabling Speculative Store Bypass Disable will make your Windows installation unable to boot if you have old enough cpu microcode : sysadmin
- SANS Top 25 Procurement Language and the OWASP Secure Software Contract Annex | tssci security
- IEC 80001 - An Introduction | Medical Connectivity
- SSD Form Factors Proliferate At Flash Memory Summit 2018
- OpenVAS 8.0 Vulnerability Scanning | Kali Linux
- iTWire - Red Hat's Jim Whitehurst on strategy and culture
- WAF Buster - Disrupt WAF By Abusing SSL/TLS Ciphers - KitPloit - PenTest Tools for your Security Arsenal ☣
- WAF_buster
- Windows Privilege Escalation (AlwaysInstallElevated)
- A Clear Guide to L1TF and Foreshadow, the Latest Intel CPU Flaws
- How to Document Security Incidents for Compliance in 10 Steps - Security Boulevard
- VERIS INCIDENT FRAMEWORK - Security Boulevard
- NBlog - the NoticeBored blog: NBlog August 17 - risk terms and concepts
- ‘Foreshadow’ flaw found in Intel CPUs – what to do – Naked Security
- A.I. in diabetes care: Can we trust it if we don’t know how it works?
- Phishing Attack Last Year Exposed Health Data on 417,000
- Windows Privilege Escalation (Unquoted Path Service)
- Three-quarters of corporate network breaches are via web applications
- Balancing cybersecurity and regulatory compliance | CSO Online
- Turning Cheap WiFi Modules Into Cheap WiFi Swiss Army Knives | Hackaday
- The Wonderful World of USB Type-C | Hackaday
- Active Directory: LDAP Syntax Filters - TechNet Articles - United States (English) - TechNet Wiki
- PowerShell Script Module Design: Public/Private versus Functions/Internal folders for Functions – Mike F Robbins
- The 10/10/10 Rule For Tough Decisions
- Visualizing a DevOps mindset | Opensource.com
- Oracle Database causing Linux auditd logs to grow fast - DBA - Rodrigo Jorge - Oracle Tips and Guides
- IXP Graphs are an Eyesore · Lindsay Hill
- 20 Random Facts About Traveling In Airplanes | foXnoMad
- How to Write a Winning Proposal for Your Doctoral Dissertation
- How Agile helps non-technical teams get things done | Opensource.com
- How the L1 Terminal Fault vulnerability affects Linux systems | Network World
- Cyber Warnings About Certain Philips Medical Devices
- How to Comply with HIPAA Regulations – 10 Steps
- RDP not working for my cloud service – Demystify
- Top 5 Mobile App Security Failures and How To Prevent Them – Visual Studio App Center Blog
- Azure 101: Governance – Cloud Solution Architect
- Brian's Home Theater PC: The Hardware - briancmoses.com
- IDEAS IN FOOD: Beignets
- Dawn of the First Digital Camera | Hackaday
- What Is Foreshadow? How This Intel CPU Vulnerability Might Affect You
- A Beginner's Guide to Understanding White Balance
- 5 Reasons to Update Your Raspberry Pi and Raspbian Regularly
- The 7 Best Text-to-Speech Apps for Android
- 7 Cool Bluetooth DIY Projects That'll Upgrade Your Old Gadgets
- Offensive Cyber Operations and the Interagency Process: What’s at Stake With the New Trump Policy - Lawfare
- How to Install FreeRADIUS on Ubuntu
- 52% of businesses have weak cybersecurity vulnerability assessment strategies - TechRepublic
- Here is the maturity level each VA style represents:
Diligent: High maturity level
Investigative: Medium to high maturity level
Surveying: Low to medium maturity level
Minimalist: Low maturity level
Only 5% of enterprises have a Diligent style, which means those companies have frequent vulnerability assessments and customized assessments for different business units and groups, said the post.
However, 33% of enterprises had a Minimalist VA style, conducting few assessments, according to Tenable. Most companies still have a lot of work to do to protect themselves in the event of a cyberattack.
"The ultimate objective - regardless of which style most closely aligns to your own - is to always keep evolving toward a higher level of maturity," Tenable said in the blog post. Check out TechRepublic's article for recommended approaches to preventing an attack.
- ICS Security: The European Perspective - Security Boulevard
- When It Comes to Data Breaches, Healthcare Businesses Stand to Lose Most - Security Boulevard
- Android Man-in-the-Disk Attack Can Expose Apps & User Data
- The Ultimate Guide to DoD 8570 - Security Boulevard
- DeepLocker: new breed of malware that uses AI to fly under the radar - Security Boulevard
- What is DoD 8570? - Security Boulevard
- How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
- How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
- Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die
- 6 most common cyber attacks - Security Boulevard
- Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?
- What CEOs and CFOs Should Know: The 7 Costs of SaaS Data Loss - Security Boulevard
- Your Infosec Supply List - Black Hills Information Security
- Fact vs. Myth: A Protegrity Cloud Solutions Blog Series | Protegrity
- KeyPass ransomware - Securelist
- PCI DSS & GDPR: The Similarities & Differences - Semafone
- Over 2,300 Data Breaches Disclosed So Far In 2018, Exposing Over 2.6 Billion Records
- More Than 10,000 Vulnerabilities Disclosed So Far In 2018 – Over 3,000 You May Not Know About
- Managing risk in the modern world - Red Hat Customer Portal
- Is it Legal To Use a VPN Service? (Depends on Where You Live)
- Jolly Roger Telephone | Revenge Has Never Been So Sweet
- The Black Vault Home Page - The Black Vault
- Cybersecurity Experiences at Small Organizations | CSO Online
- The state of cybersecurity at small organizations | CSO Online
- Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat - Motherboard
- A White Paper About Security White Papers That Looks Like a Security Article
- Cybersecurity threats: How to discover, remediate, and mitigate – Microsoft Secure
- How Microsoft 365 Security integrates with your broader IT ecosystem—part 3 – Microsoft Secure
- DependencyCheck v3.3.1 - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
- BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable - KitPloit - PenTest Tools for your Security Arsenal ☣
- MPs concerned about the UK’s cyber security – IT Governance Blog
- 12 Things Mentally Strong People Do That Nobody Else Does
- How to leverage GDPR compliance for increased consumer trust
- Are Legacy Medical Device Security Flaws Going Unfixed?
- Should Staff Ever Use Personal Devices to Access Patient Data?
- HHS OIG Finds Security Flaws in Maryland’s Medicaid System
- Healthcare Exchange Standards: Healthcare use of Blockchain on FHIR
- Hacking pacemakers, insulin pumps and patients' vital signs in real time | CSO Online
- Take-aways from Black Hat USA 2018 | CSO Online
- The unintended consequences of GDPR | CSO Online
- Vegas hotel room checks raise concerns at Def Con, Black Hat | CSO Online
- Debian Turns 25! Here are Some Interesting Facts About Debian Linux | It's FOSS
- Oracle open sources Graphpipe to standardize machine learning model deployment | TechCrunch
- Testing web applications with Selenium [LWN.net]
- L1TF/Foreshadow News and Benchmarks | Tux Machines
- Automating backups on a Raspberry Pi NAS | Opensource.com
- Asia Pacific Consumers Prioritize Security Over Convenience in the App Experience | APMdigest - Application Performance Management
- Why IT Support Needs Professionalism | Purple Griffon
- Create Disk Usage Reports with PowerShell and WizTree – smsagent
- Adding Another Disk to the RAID 10 on My KVM Server - Patshead.com Blog
- Layer 1 Troubleshooting Scenario (by Tony Fortunato)
- Infrastructure TAP's and the need for a comprehensive network visibility system! (by Gabriel Guriencu)
- Chris's Wiki :: blog/spam/ZipAttachmentWithEverything
- Chris's Wiki :: blog/sysadmin/AccountCreationScriptEvolution
- Foreshadow (L1TF) Intel CPU vulnerabilities | Born's Tech and Windows World
- Microsoft Security Advisory Notification (August 14, 2018) | Born's Tech and Windows World
- Why luck might be subjective and not part of the world | Aeon Essays
- Tsutomu Yamaguchi
- Everyone Worries About Money, Even The Wealthy — My Money Blog
- How to easily update your VMware ESXi Hypervisor to the latest version with one ESXCLI command | TinkerTry IT @ Home
- Understanding L1 Terminal Fault Mitigation | TinkerTry IT @ Home
- What Is the Real Value of $100 in Your State? | 2018 | Tax Foundation
- Homemade Gluten Free Vegan Falafel Recipe -- Grain Free, Delicious, and Easy | Penniless Parenting
- inanzzz | Some useful notes about HAProxy, load balancing, Keepalived and security
- OZON innovates by integrating ModSecurity with HAProxy - Ozon Cybersecurity Blog
- Scalable WAF protection with HAProxy and Apache with modsecurity - HAProxy Technologies
- Using vRealize Suite LifeCycle Manager to deploy an Enterprise Distributed vRealize Automation environment. | JohannStander
- Vulnerability in Java VM Component of Oracle Database allows for Whole System Compromise - Appuals.com
- Git Basics - Git Series Part 1
- Vocal - a modern Vala podcast player - LinuxLinks
- Microsoft Patch Tuesday 17134.228 Enhances Battery Performance and Mitigates L1TF Vulnerability - Appuals.com
- ClickUp - An Awesome Project Management and Productivity App
- Encrypting NFSv4 with Stunnel TLS | Linux Journal
- Ubuntu updates for L1 Terminal Fault vulnerabilities | Ubuntu blog
- L1 Terminal Fault - The Latest Speculative Execution Side Channel Attack - Phoronix
- A sysadmin’s handy cheat sheet for SELinux | Opensource.com
- No communication skills? Tech is not for you! | The ORACLE-BASE Blog
- ODA database been stuck in deleting status - Blog dbi services
- Intel discloses another set of processor vulnerabilities
- VMware Security Advisory VMSA-2018-0020 and VMSA-2018-0021 - L1 Terminal Fault (L1TF): CVE-2018-3646, CVE-2018-3620, and CVE-2018-3615 - VMware Security & Compliance Blog - VMware Blogs
- Comparison between Ansible and Puppet – Codingbee
- BGP for Beginners
- Beginner's Guide to Understanding BGP
- Five Wishes: A Living Will That Goes Beyond Just Prolong / Do Not Prolong Life — My Money Blog
- Wish 1: The Person I Want to Make Care Decisions for Me When I Can’t.
Wish 2: The Kind of Medical Treatment I Want or Don’t Want.
Wish 3: How Comfortable I Want to Be.
Wish 4: How I Want People to Treat Me.
Wish 5: What I Want My Loved Ones to Know.
- Vulnerability Scanning vs. Penetration Testing: What is the difference, and what is right for me? – The Personal Blog of Sean Goodwin
- How Mature Are Your Cyber Defender Strategies? - Blog | Tenable™
- Must-Know Ransomware Statistics 2018
- Cyber Attacks Make July a Painful Month for Healthcare
- Open FAIR Complements Risk Management Programs | Security Architects Partners
- IT threat evolution Q2 2018 - Securelist
- NBlog - the NoticeBored blog: NBlog August 9 - cyberterms
- Black Hat USA 2018: SamSam has yielded $6M for creators
- TIDoS Framework - The Offensive Web Application Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- TIDoS
- The only free ISO 27001 resources you will ever need – IT Governance Blog
- Do you know the difference between cyber security and information security? – IT Governance Blog
- How business continuity contributes to your organisation’s cyber resilience – IT Governance Blog
- The Top 3 Open Source Tools for AWS Incident Response - Delta Risk
- Gerald M. Weinberg: Writer - Consultant OFFICIAL WEBSITE Dedicated to Helping Smart People be Happy
- GOP chair urges Senate to pass DHS cyber reorganization bill | TheHill
- DevSecOps: The Keys to Success - HealthcareInfoSecurity
- HIPAA Security Rule Turns 20: It's Time for a Facelift
- Tom Walsh
- CNIL warns pair of smaller companies about GDPR violations
- Errata Security: What the Caesars (@DefCon) WiFi situation looks like
- Vectra Spotlight Report - Manufacturing 2018
- (2) New Messages!
- Nmap Cheat Sheet – it…'s Notes
- PRINCE2 project management with OpenProject – it…'s Notes
- DISA Approves STIGs for VMware NSX on DoD Networks
- Custom Certificate Replacement Guide
- Network Architect vs Network Engineer (Part 2) — jumboframe.net
- Network Architect vs Network Engineer (Part 1) — jumboframe.net
- Altering MDT Task Sequence to Update from Windows Update – Stick To The Script
- CISSP Study Agenda and Resources, 16-Weeks : cissp
- Active Directory: Workstation Logon Restrictions (Log On To)
- Server-side Ransomware SAMSAM Hits Healthcare Industry - Security News - Trend Micro USA
- What Makes SamSam, the Ransomware that Crippled Atlanta, So Different
- RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…
- Chris Hafey's Blog
- My Road Warrior Survival Guide
- Rethinking The Need For WSUS – Stick To The Script
- 6 Eye-Raising Third-Party Breaches
- IBM WAS Global Security problems with Active Directory when Workstation Restrictions are configured - United States
- LDAP error codes | ServiceNow Docs
- Automate password changes with Ansible
- Chrissanders88 presentations
- Active Directory Schema Management | Alexander's Blog
- acr2018final - cisco-acr-2018.pdf
- How to Improve the California Consumer Privacy Act of 2018 | Electronic Frontier Foundation
- User Login on JMX-console ;( |JBoss Developer
- IDEAS IN FOOD: Triple Chocolate Remix
- Trip of a lifetime to Japan
- DSHR's Blog: The Blockchain Trilemma
- Ultimate List of Tensorflow Resources for Machine Learning Engineers - Big Data Beard
- Successful IT Departments Engage with End Users | APMdigest - Application Performance Management
- PowerShell One-liner to Extract a Windows 10 Upgrade Error Code – smsagent
- FreeBSD has its own TCP-queue-of-death bug, easier to hose than Linux's SegmentSmack • The Register
- Windows 10 V1803: Domain join bug and a workaround | Born's Tech and Windows World
- 21 SysAdmin Influencers, Bloggers and Geeks to Follow - ITChronicles
- The mechanics of Windows patching - in plain English | Computerworld
- We continue at MS-DEFCON 1: Don’t install any of the July patches @ AskWoody
- redhat: Cloudification Is Coming, but Service Providers’ Processes and Culture Must Change | Al Bawaba
- The CEO of Red Hat Wants to See His Employees Cussing and Crying. The Reason Behind It Is Priceless | Inc.com
- Easy Disaster Recovery Plan – neckercube.com
- Firewalld: The Future is nftables - RHD Blog
- VMware NSX - Top 9 Free Books To Read | ESX Virtualization
- Black Hat USA 2018: Google, Microsoft and Red Hat dish on the Meltdown/Spectre backstory
- Varying Tiers in the MSP Help Desk — Building Your Support System
- Geo Redundancy: Amazon S3 vs Microsoft Azure Blob vs Google Cloud Storage
- Delicious Onion Mushroom Pasta Recipe -- Gluten Free, Vegan, Frugal, and Easy | Penniless Parenting
- Building a better thermostat with Home Assistant | Opensource.com
- Multiple Flaws Discovered in Healthcare Software Firm - Infosecurity Magazine
- How to Install and use Open vSwitch (OVS) 2.9 with KVM on CentOS 7 / RHEL 7 Server
- DocBook - markup language for technical documentation - LinuxLinks
- 5 Tools to Scan a Linux Server for Malware and Rootkits
- How to Install InvoicePlane on Ubuntu 18.04 LTS
- South Carolina TV maker laying off most workers, blaming Trump tariffs - Japan Today
- How to become a certified DPO – IT Governance Blog
- WannaCry Outbreak Hits Chipmaker, Could Cost $170 Million
- Do you need a vulnerability disclosure program? The feds say yes | CSO Online
- PMKID Vulnerability that bypasses 4-way Handshake discovered in WPA2 WiFI Encryption - Appuals.com
- Empowering Operations to Tackle Ransomware with Rubrik Polaris Radar - Wahl Network
- Updating Debian from stretch to buster aka Debian 9 to 10
- WannaCry has infected chip maker TSMC fabs … | Born's Tech and Windows World
- Feeling the Heat of High-Frequency Trading | Hackaday
- FAQs About Master's Degree in Cybersecurity from WGU | Alexander's Blog
- Mastering MITRE's ATT&CK Matrix
- Mitre ATT&CK matrix
- Atlanta’s Reported Ransomware Bill: Up to $17 Million
- How America Can Stop Being the Wild West of Data - Bloomberg
- U.S. Treasury calls for national data breach notification and increased data protections
- Black Hat Arsenal USA 2018 — The w0w lineup – Hack with GitHub – Medium
- Most SMBs Not Equipped to Handle Security Concerns: Study
- Do you have a data breach response plan? – IT Governance Blog
- What is business continuity/ISO 22301 and why do you need it? – IT Governance Blog
- Resurrecting a Dead Library: Part Two - Stabilization - mtlynch.io
- A new WPA/WPA2 attack with PMKID | Born's Tech and Windows World
- Failure Scenarios for vSAN — ThinkCharles.net
- How To Enter BIOS Utility (UEFI Settings) On All PCs And Boot From USB?
- Discus - Show Colourised Disk Space Usage in Linux
- Proxmox config directory & files | SvennD
- VMware vSphere 6.7 Performance Best Practices PDF | ESX Virtualization
- Protecting your thoughts – Data Protection Hub
- Valuable Lessons from My Second Year of Freedom | Mad Fientist
- When cheap and simple turns into anything but… | A Rambling Geek
- Snippet 0x0E: Booting image files and ISOs with KVM/QEMU (EFI and BIOS) - Philipp's Tech Blog
- Raccoon - A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning - KitPloit - PenTest Tools for your Security Arsenal ☣
- The default OpenSSH key encryption is worse than plaintext
- Doc Searls Weblog · A helpful approach to personal data protection regulation
- 20180724-economic-espionage-pub.pdf
- Increased Windows Modules coverage with PowerShell Core 6.1 | PowerShell Team Blog
- SQL Performance troubleshooting guide: A walk through – Don Castelino
- What are the best Performance Testing Tools? – Testing Spot
- How to Find & Replace Outdated Windows Drivers
- driverquery > driver.txt
- Happy Birthday, Harry Potter: wizard-worthy Pi projects - Raspberry Pi
- For a 7-Minute Workout, Try Our New App - The New York Times
- Invoke-VMScriptPlus v2 - LucD notes
- Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)
- Windows EOL dates differs for clients and servers | Born's Tech and Windows World
- Venezuela says Maduro was target of attempted drone attack
- My Own Car System, Rear Camera, Offline Maps & Routing, Map Matching with Go on Raspberry Pi part II · Fabrice Aneche
- My Own Car System, Rear Camera, Offline Maps & Routing on Raspberry Pi part I · Fabrice Aneche
- How to Make Android Faster: What Works and What Doesn't
- Zero Day Initiative — Checking In: A Look Back at the First Half of 2018
- Internet edge device security - NCSC Site
- Global Threats to Information Systems | US-CERT
- Securing Network Infrastructure Devices | US-CERT
- 6 Steps to Build an Incident Response Plan | Webroot
- Windows Incident Response: The Future of IR, pt I
- Thoughts on the Information Security Skill Set •
- CSP Falco Space Asset - FINAL.pdf
- Spectre: the vulnerability that just keeps on giving
- Gen V Security - Bridging the (Cybersecurity) Generation Gap
- OWTF v2.4 - Offensive Web Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- The age of cyberwar is here. Now, citizens need to have a say | David Sanger | Opinion | The Guardian
- The Art of the Presentation (Part 3 of 3) | Thom Langford
- Check IIS Health (Services, Site, AppPool Statuses) - Syspanda
- Tracking & Monitoring Domain Admins with Logstash - Syspanda
- Generate Windows Services Report - Syspanda
- APT Trends Report Q2 2018 - Securelist
- The Top 20 Penetration Testing Tools, Part 2
- The GDPR is not a one-day thing - Security Art Work
- Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
- Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
- CIS Adapts Critical Security Controls to Industrial Control Systems - Blog | Tenable™
- Cybersecurity Benchmarking: Where’s The Data? - Blog | Tenable™
- Cookies and consent at the IAPP
- Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
- Vulnerability Management: Why the Problem Can't Be Solved
- HHS Weighs Changes to Health Data Privacy Regulations
- Securing the Internet of Things | US-CERT
- FBI Releases Article on Securing the Internet of Things | US-CERT
- Patch Lady – my response @ AskWoody
- How GDPR Could Turn Privileged Insiders into ...
- How to Set Clock Time on AD domain Controller and Sync Windows Clients – jasoncoltrin.com
- How to configure multiple NTP network time servers on a Windows client · Ctrl blog
- Find Windows 10 Upgrade Blockers with PowerShell – smsagent
- Introducing: A Diverse, Free Stock Photo Library — The WordPress.com Blog
- All about headroom and mandatory patching before June 2019 | Frits Hoogland Weblog
- SDKMAN - A CLI Tool To Easily Manage Multiple Software Development Kits
- Rose Eveleth, Podcast Producer | Cool Tools
- AWS IoT Device Defender Now Available – Keep Your Connected Devices Safe | AWS News Blog
- Configuring Ansible to Manage Windows Servers – Step by Step | Argon Systems
- Testing POE with Pockethernet (by Tony Fortunato)
- A PowerShell Conference In A Book | SQL DBA with A Beard
- Senator suggests ways to combat misinformation and boost data privacy
- The US is not prepared to shape global internet policy
- Managed detection and response supports internal security teams
- 20 Fascinating Subreddits With Facts and Stories That'll Blow Your Mind
- An open letter to Microsoft management re: Windows updating | Computerworld
- Windows (10) Update Survey and an open letter to Microsoft | Born's Tech and Windows World
- July 2018 patches: Review for administrators | Born's Tech and Windows World
- It's Becoming Difficult to Discuss Interesting Topics With People Who Don't Read - Daniel Miessler
- WTF - A Terminal Dashboard
- Risk Based Security Announces Sponsorship and Integration With OWASP Dependency-Track
- Security Technologies: ExecShield - Red Hat Customer Portal
- SPECTRE Variant 1 scanning tool - Red Hat Customer Portal
- American Cyber Security Firm FireEye Denies Hacking Chinese Military - Motherboard
- We Need to Change the Dictionary Definition of 'Hacker' - Motherboard
- Looking back at Microsoft’s July 2018-Patches | Born's Tech and Windows World
- Virtualization The Future: VMware Certification Tracks and Levels Explained
- All of Kodi Common Errors In This One Guide (With Images)
- Your essential guide to what sysadmins really mean – Naked Security
- Katello: Security Compliance Management with OpenSCAP | Lisenet.com :: Linux | Security | Networking
- Intel patches three vulnerabilities in its Smart Sound Tech
- WAScan v0.2.1 - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Faraday v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
- CCTV and the GDPR – an overview for small businesses – IT Governance Blog
- Ensure you’re #BreachReady in the media sector – IT Governance Blog
- The NIS Regulations: Why cyber resilience is crucial – IT Governance Blog
- Mandatory documents for ISO 27001:2013 – IT Governance Blog
- Ransomware Attack Leads to Discovery of Lots More Malware
- Healthcare Exchange Standards: Privacy and Security Considerations for the use of Open APIs for Patient Directed Exchange.
- Summary: The War on Normal People - Daniel Miessler
- Anatomy of the American Death Spiral - Daniel Miessler
- Best Cybersecurity Certifications to Consider in 2019 | Alexander's Blog
- How To Burp With Confidence - Our 5 Favorite Features | CQURE Academy
- SQL Server on Linux - I/O internal thoughts
- ODA, network interface and configure-firstnet - Blog dbi services
- rapid7-under-the-hoodie-2018-research-report.pdf
- What is a race condition? | Born's Tech and Windows World
- Real-Time Rogue Wireless Access Point Detection with the Raspberry Pi | Linux Journal
- The US as a threat. Love for NATO. This is how Canadians feel about security issues
- Great Books about Strong Girls and Women -A Short List » Public Libraries Online
- SharePoint Talk: GDPR/DSGVO Field Guide for Office 365 & Azure
- The Law of Military Cyber Operations and the New NDAA - Lawfare
- How to Attach a High-Gain Antenna to a Router (And Which One to Buy)
- 15 of the Best Courses on Udemy for Self-Improvement
- Get Started With Ethical Hacking Using Kali Linux and Raspberry Pi
- Dockerizing R and Python Web Services – Microsoft Machine Learning Server
- Azure Government Marketplace expanding with new Pay-As-You-Go offers – Azure Government Cloud
- The Different Ebook Formats Explained: EPUB, MOBI, AZW, IBA, and More
- How to Cat-Proof Your Laptop Computer and Desk Area
- Becoming a Full Stack Product Person
- It’s About Time and Project Management | The Networking Nerd
- Navigating IT Chaos: Why the Challenges of Discovery and Inventory Are More Relevant Than Ever | APMdigest - Application Performance Management
- The State of IT Service Delivery: Next-Generation Technologies Force Change | APMdigest - Application Performance Management
- Create a USB Drive for Windows Server 2019 Installation
- 2018 BH/DC/BSidesLV Hiring List ·
- MPECS Inc. Blog: Hypervisor, Cluster, and Server Hardware Nomenclature (A quick what's what)
- White House reportedly working on federal data privacy policy
- Samsung patches multiple SmartThings Hub security flaws
- 11 Ways (Not) to Get Hacked - Kubernetes
- DevOps Hiring: The Ultimate Guide | The Enterprisers Project
- How to Install and Manage Virtual Machines and Containers
- Some of Intel's Effort to Repair Spectre in Future CPUs | Linux Journal
- Install ELK as Centralized Logfile Management Server on CentOS 7
- How to Flush the DNS Cache on Linux - Make Tech Easier
- Spectre CPU Attacks Could Go Remote With NetSpectre
- My VCAP Network Virtualization Deployment exam experience | viktorious.nl – Virtualization & Cloud Management
- 17 Key MySQL Config File Settings (MySQL 5.7 proof) - Speedemy
- Tech "R" Us (by Paul W. Smith)
- Cookbook development on the VMware platform
- Clint Boessen's Blog: Excluding TEMP Directory from User Profile Disks in Remote Desktop Services
- Healthy Chinese Restaurant Style Pineapple Chicken Recipe -- Paleo, Gluten Free, Allergy Friendly | Penniless Parenting
- Licensing Microsoft SQL Server in a VMware Cloud on AWS Environment - Part 2 - VMware Cloud Community
- VRO Enable lockdown mode – Virtual Me
- Virtualization Based Security (VBS) in vSphere 6.7 - VMARENA
- Is your home a better investment than the stock market?
- Keys to Maintaining a Lean Business Model as a Big Corporation
- Bank Grade Security
- Georgia congressman is the latest to introduce data privacy bills
- These vSphere Configurations Will Slow Down Your VMs
- MySQL Load Balancing with HAProxy - Tutorial | Severalnines
- BDB Podcast EP 35 - Exploring the magical world of Disney Data Analytics - Big Data Beard
- U.S. GAO - High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation
- Azure Stack Readiness Checker – AzsReadinessChecker
- Turning Tactical IT Into Strategic IT | APMdigest - Application Performance Management
- The Mentor/Mentee Relationship | Don Jones
- Software supply chain attacks set to become a major threat
- Exactis breach exposes 340M records, may compel GDPR-like reg in U.S.
- Perspectives of a former CISO: Disrupted security in digitalization – Microsoft Secure
- A sysadmin's guide to Ansible: How to simplify tasks | Opensource.com
- Policy Analyzer – minor update – Microsoft Security Guidance blog
- NBlog - the NoticeBored blog: NBlog July 20 - ISO/IEC 27001 and 27031 revisions
- Basic Digital Security Could Have Prevented One of the Biggest Political Scandals in American History - Motherboard
- Canadian Telecoms Make the Most Money on Mobile Data in the World - Motherboard
- Driving data security is a shared responsibility, here’s how you can protect yourself – Microsoft Secure
- Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework – Microsoft Secure
- Equifax agrees to cybersecurity regulations set forth by 8 U.S. States
- Faraday Beta v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
- ProbeManager - Centralize Management Of Intrusion Detection System Like Suricata, Bro, Ossec... - KitPloit - PenTest Tools for your Security Arsenal ☣
- TP-Link-defaults - Python Script For Trying Default Passwords For Some TP-Link Hotspots - KitPloit - PenTest Tools for your Security Arsenal ☣
- THRecon - Threat Hunting Reconnaissance Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
- Doing More with Less: How MSSPs Succeed in Today's Cyber Landscape
- VOOKI - Web Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Optiva Framework - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Study suggests buried Internet infrastructure at risk as sea levels rise | EurekAlert! Science News
- LogonTracer - Investigate Malicious Windows Logon By Visualizing And Analyzing Windows Event Log - KitPloit - PenTest Tools for your Security Arsenal ☣
- KillerBee - IEEE 802.15.4/ZigBee Security Research Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
- 5 data protection policies your organisation must have – IT Governance Blog
- Load Balancing with HAProxy | StackPath Blog
- How to do a SQL Vulnerability Assessment in SSMS - Mohammad Darab
- ZDLRA ready for Oracle Database 18c – Upgrade your Database - NOW!
- Real-life examples of social engineering – part 2 – IT Governance Blog
- Real-life examples of social engineering – IT Governance Blog
- How to perform a comprehensive vulnerability assessment – IT Governance Blog
- Handling cyber threats in 7 simple steps – IT Governance Blog
- Infographic: List of data breaches in 2017 – IT Governance Blog
- 25062018_Minimum_Cyber_Security_Standard_gov.uk__3_.pdf
- Green paper: DSP Toolkit and NIS Regulations: The impact for healthcare organisations – IT Governance Blog
- Maintaining independence of the DPO role in healthcare organisations – IT Governance Blog
- How to simplify the data mapping process under the GDPR – IT Governance Blog
- NIS Directive Consultancy
- Information security and compliance training for the healthcare sector – IT Governance Blog
- Tools to help identify gaps in your GDPR compliance – IT Governance Blog
- The business case for ISO 27001 – IT Governance Blog
- How to conduct an ISO 27001 internal audit – IT Governance Blog
- The GDPR: Do you know the difference between personal data and sensitive data? – IT Governance Blog
- The NIS Directive (NIS Regulations) – the UK law businesses need to know about – IT Governance Blog
- Bill Text - AB-375 Privacy: personal information: businesses.
- FDA: Make Sure EHRs Used for Clinical Studies Are Secure
- Software Flaws: Why Is Patching So Hard? - HealthcareInfoSecurity
- Why Cybersecurity Is Critical to Healthcare Innovation
- A CIO on Carrying the Burden of Medical Device Cybersecurity
- Cletis Earle
- $4.3 Million HIPAA Penalty for 3 Breaches - HealthcareInfoSecurity
- OpenSSH security and hardening - Linux Audit
- How Can an ISAC Improve Cybersecurity and Resilience?
- Comprehensive Guide to Sqlmap (Target Options)
- Washington State to Launch Privacy Checklist Beta
- DPO liability and potential insurance coverage
- 3 Ways Extract Password Hashes from NTDS.dit
- LabCorp Still Recovering From Ransomware Attack
- A New Effort to Draft Medical Device Cybersecurity Guidance
- Equifax must incorporate stronger data security measures after massive breach, consent order says
- EU Cybersecurity Plan Aims to Streamline Product Certification | Bloomberg Law
- Cyber Readiness Institute
- Global News Roundup — June 18–25, 2018
- A year after WannaCry, healthcare organizations face mounting cyberthreats - Modern Healthcare Transformation Hub - Modern Healthcare
- How your EU DPA wants your DPO's contact information
- How many GDPR complaints so far?
- AI spots legal problems with tech T&Cs in GDPR research project | TechCrunch
- Brazil moves forward with online data protection efforts | ZDNet
- Analysis: Vermont's data broker regulation
- Amazon’s Healthcare Push Could Run into HIPAA Compliance Issues
- The Best Encrypted Messaging Apps You Should Use Today [Updated]
- Threat Model Thursdays: Crispin Cowan | Emergent Chaos
- The Calculus of Threat Modeling — Leviathan Security
- Errata Security: Lessons from nPetya one year later
- Errata Security: SMB version detection in masscan
- Evil Tester: Using a Travel Router for Mobile Testing
- I reviewed 600+ call-for-paper submissions, (and you’ll probably guess what happened next.) – tisiphone.net
- How to Test and Measure the Effectiveness of Your Security Awareness Program - Delta Risk
- Aftershocks of GDPR: Making Sense of the Business-Wide Effects of New Data Privacy Laws - Delta Risk
- Risk Deck | Emergynt
- Adam Shostack: Tabletop Infosec Games
- Cybersecurity Career Path – A Fresh Perspective - The Ethical Hacker Network
- Cisco CPO: Privacy Is Not About Secrecy or Compliance
- Secure by Default Is Not What You Think
- A Technical Deep Dive into STARTTLS Everywhere | Electronic Frontier Foundation
- The GDPR and Browser Fingerprinting: How It Changes the Game for the Sneakiest Web Trackers | Electronic Frontier Foundation
- What We Talk About When We Talk About Risk
- 6 M&A Security Tips
- Creating a Defensible Security Architecture
- What The Code of Hammurabi Can Teach Us About Hardware and Software Liability - Daniel Miessler
- The Evolution of the SOC and the CSIRT - Daniel Miessler
- Getting Hired: A Few Tips ·
- Windows 10 Pro V1803: SMBv1 ‘special traps’ | Born's Tech and Windows World
- Lessons from My Strange Journey into InfoSec
- How to perform a risk assessment: Rethinking the process | CSO Online
- One-Third of Businesses Lack a Cybersecurity Expert
- DNS Rebinding Explained - Daniel Miessler
- New Cyber Center Opens at Augusta University in Georgia
- Top reasons CEOs should care about privacy | CSO Online
- gtir-executive-guide-2018.pdf
- Home | balbix.com
- Oracle CPU July 2018 | Onapsis
- What makes CISOs successful? | CSO Online
- To Raise Exceptional Children, Teach Them These 7 Values
- Burstcoin Rig 1.0 & 1.5 being retired…. for a new rig – TDSheridan Lab
- Solved: Use USG to block sites/apps, like ER - Ubiquiti Networks Community
- GitHub - StevenBlack/hosts: Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
- Five ways to make your presentation better | Seth's Blog
- We’re still clueless about lifetime value | Seth's Blog
- Advisory on July 2018 .NET Framework Updates | .NET Blog
- New TETRA Trunk Tracker for use with SDR# and the TETRA Demodulator Plugin - rtl-sdr.com
- Using a HackRF to Spoof GPS Navigation in Cars and Divert Drivers - rtl-sdr.com
- .Net-Framework Update July 2018 pulled | Born's Tech and Windows World
- Understanding Advanced Features in a Network Packet Broker (by Greg Zemlin)
- My vSphere 6.7 Upgrade – WOW! – Notes from MWhite
- 9 Useful Electronics Tools Under $13 | Cool Tools
- IT Architect: Foundation in the Art of Infrastructure Design: A Practical Guide for IT Architects · vNinja.net
- Patch those Dell Servers easily! · vNinja.net
- Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 3
- NAS vs iSCSI: When You Need What
- An Introduction to Cybersecurity: The First Five Steps – ThisHosting.Rocks
- Patching my databases with the July 2018 PSU, BP and RU
- I've reviewed and screened thousands of resumes, and I am sharing my preferred resume format, free to download as a Word doc (along with my best resume advice). : FinancialCareers
- Small file performance on distributed filesystems - Round 2
- Further Reflections on the Russian Hacking Indictment - Lawfare
- How to convert System partition from MBR to GPT (EFI) on Windows 10 without loosing data – support for UEFI and SecureBoot – MILOSZENGEL.com
- mbr2gpt
- 4 Steps to Automated Major Incident Management | APMdigest - Application Performance Management
- 9 New Microsoft Teams Features, Meetings and Chat Improvements - Tom Talks
- Use PowerShell to Determine What Your System is Talking to – Mike F Robbins
- The need for having both a DW and cubes | James Serra's Blog
- Troubleshooting a Cloud Problem with Wireshark (by Paul Offord)
- Building tiny container images | Opensource.com
- Detect and correct orphaned ‘adminCount=1’ in Active Directory | >_
- Revised .NET Framework Update KB4340558 (July 19, 2018) | Born's Tech and Windows World
- Windows: Stop error 0xD1 in July 2018 updates explained | Born's Tech and Windows World
- Rebuild
- Streamlining build environment management with Linux containers
- Linux Monitor Hard Disks Temperature With hddtemp - nixCraft
- Building Debian packages in CI (ick)
- How to Monitor Linux Server Security with Osquery
- whowatch - Monitor Linux Users and Processes in Real Time
- EncryptPad: Encrypted Text Editor For Your Secrets - Linux Uprising Blog
- Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development
- 4n6k: Forensics Quickie: Identifying an Unknown GUID with Shellbags Explorer, Detailing Shell Item Extension Block 0xbeef0026, & Creative Cloud GUID Behavior
- What is Yammer and why you need it - SharePoint Maven
- Troubleshoot Windows 10 Battery Life and Modern Standby
- Alacritty - A Fastest Terminal Emulator for Linux
- Rewritten GandCrab Ransomware Targets SMB Vulnerabilities To Attack Faster
- Linux history Command Tutorial for Beginners (8 Examples)
- Seccomp security profiles for Docker | Docker Documentation
- How The Update Framework is Working to Improve Software Delivery Security
- SAP Security Notes July 2018 | Onapsis
- The Best Blogs Every Network Engineer Must Follow - RouterFreak
- MTU and TCP MSS
- Microsoft 365 Usage Analytics, New Free Power BI Office 365 Usage Reports from Microsoft - Tom Talks
- Containers or virtual machines: Which is more secure? The answer will surprise you | ZDNet
- James Bottomley
- Why the U.S. Needs Federal Data Privacy Legislation - Lawfare
- 9 Essential Personal Finance Skills to Teach Your Kid Before They Move Out
- 11 Stock Market Oddities — and How to Exploit Them
- netdev day 1: IPsec! - Julia Evans
- There are no shortcuts ~ Get Rich Slowly
- Why ‘Find Your Passion’ Can Be Bad Advice — My Money Blog
- Homemade Easy Apple Chips Recipe | Penniless Parenting
- Why you should bundle the root CAs in your image - Fabio Alessandro "Fale" Locati's blog
- Why DOD Should Look Before Leaping into Open Source | SIGNAL Magazine
- 6 Essential Tips to Help You Write Your World-Class Business Plan
- The forever fallacy ~ Get Rich Slowly
- Portland Underground Grad School
- TxFS Linux File-System Supports ACID Transactions, Simple API - Phoronix
- A Linux Sysadmin's Guide to Network Management, Troubleshooting and Debugging
- Scout_Realtime - Monitor Server and Process Metrics in Linux
- Insights Security Hardening Rules - Red Hat Customer Portal
- Road to RHCA--Preparation Meets Opportunity | Linux Journal
- The Road Less Traveled: Certifications Can Chart a Great Career in Linux and Open Source | Linux Journal
- Taz Brown
- Troy Hunt: The 111 Million Record Pemiblanc Credential Stuffing List
- Teleconsole - Share Your Linux Terminal with Your Friends
- 5 open source principles that help DevOps teams excel | The Enterprisers Project
- bootiso: Easy ISO To Bootable USB Drive From The Command Line - Linux Uprising Blog
- Groot Simplifies Entering Chroot On Any Linux Distribution - Linux Uprising Blog
- jobs.freenode.net
- Is your Network Security Slowing you Down? (by Jason Nutt)
- How to Prioritize Product Features and Improvements
- Prioritizing a Technical Roadmap Against a Product Roadmap - via @codeship | via @codeship
- What You Should Know About Penetration Testing - via @codeship | via @codeship
- PowerShell For Programmers: Here Strings, There Strings, Everywhere Some String Strings – Kory Thacher
- Book Review: Architecting Microsoft Azure Solutions – Exam Guide 70-535 – Azure Development Community
- Staying up-to-date with .NET Container Images | .NET Blog
- SAP on Azure: General Update – June 2018 | Running SAP Applications on the Microsoft Platform
- Generating documentation as code with mermaid and PlantUML – Rule of Tech
- White hat gray hat black hat - what's the difference? - The Silicon Underground
- Budget pfSense build with workstation parts - The Silicon Underground
- HP Z210
- SAP on SQL Server – Performance Tuning and Optimization Clinic – Microsoft Premier Offerings for SAP
- Understanding Containers – the layer between the operating system’s kernel and the application – Microsoft Faculty Connection
- Key Differences between VM and Container Vulnerability Scanning – Steve Lasker's Web Log – blogs.msdn.microsoft.com/SteveLasker
- PowerShell Settings file (import/export) – Joe Talks Microsoft
- SharePoint User Adoption – SharePoint Steve
- (82) Irving Younger's 10 Commandments Of Cross Examination at UC Hastings College Of The Law - YouTube
- Windows Command-Line: The Evolution of the Windows Command-Line – Windows Command Line Tools For Developers
- TEMPDB – Files and Trace Flags and Updates, Oh My! – MSSQL Tiger Team
- MSDTC Supported Configurations – SQL Server Premier Field Engineer Blog
- Preparing for Certified Kubernetes Application Developer (CKAD) exam and how it compares to CKA – Arsen Vladimirskiy
- The SQL Server Defensive Dozen Part 2 – SQL Server Encryption, Key Management, And Data-At-Rest Encryption – SQL Server Cybersecurity
- Steps for Hardening SQL Server 2016: The Defensive Dozen – SQL Server Cybersecurity
- System.IO.Pipelines: High performance IO in .NET | .NET Blog
- Raspberry Pi + Azure Functions + Cognitive Services + Microsoft Teams -> How a Pi informs us about lunch | modern workplace solutions
- What is your Agile? – Premier Developer
- The Best 18650 Battery and How to Avoid Buying Fakes
- The 12 Best Kodi Add-Ons for Watching Live News
- How to Network Boot a Raspberry Pi Without a MicroSD Card
- 8 Surprising Uses for Linux That You Can (Mostly) Try Yourself
- How to Record Audio With a USB Microphone on Android
- 5 of the Most Famous Computer Viruses and Their Terrible Impact
- 5 Causes for a Raspberry Pi That Won't Boot (And How to Fix Them)
- How to Encrypt and Protect Your Data and Files Using VeraCrypt
- 6 Helpful Machine Learning Tutorials and Courses to Grasp the Essentials
- Secure coding practices in Java: challenges and vulnerabilities | the morning paper
- How not to structure your database-backed web applications: a study of performance bugs in the wild | the morning paper
- EnclaveDB: a secure database using SGX | the morning paper
- Machine Learning Getting Started Guide | Tallan's Blog
- Generating a WiFi Radio Heatmap with a Helical Antenna, Antenna Rotator and a HackRF - rtl-sdr.com
- Tracking Police and Military Aircraft at the G7 Summit with an RTL-SDR - rtl-sdr.com
- Has paying the ransom become business as usual? - Help Net Security
- Exposing Hospital Pager Privacy Breaches - rtl-sdr.com
- Ten awesome 3D-printable Raspberry Pi goodies - Raspberry Pi
- How To Get Rockwell TechED 2018 Labs and Presentations for Free - The Automation Blog
- Installing Powershell on Centos 7
- Microsoft’s July 2018 patch mess – put update install on hold | Born's Tech and Windows World
- Identity Theft, Credit Reports, and You | Kalzumeus Software
- PowerShell Functions to Get Logged On User and Logoff Logged On User – Jason Pearce
- Removing The Last Governor: Core Software Pricing - IT Jungle
- IDEAS IN FOOD: Bubble Mix
- Microsoft Teams Free Version, What's included, What's not? - Tom Talks
- AWS Storage Gateway Recap – SMB Support, RefreshCache Event, and More | AWS News Blog
- 96-core ARM supercomputer using the NanoPi-Fire3 | Climbers.net
- Teardown Of USB Fan Reveals Journalists’ Lack Of Opsec | Hackaday
- U.S. GAO - Information Security: Supply Chain Risks Affecting Federal Agencies
- How to use PowerShell jobs to parallelize scripts – Virtually Sober
- A rare breed of the brute-force: A history of one attack
- 70 percent would leave a job if their digital activity was secretly monitored
- How Nonprofits Practice Continuous Improvement | Beth's Blog
- Best practices for securing the container life cycle – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
- CredSSP, Windows RDP connection error. | Nerd Drivel
- Chris's Wiki :: blog/solaris/ZFSOurSparesSystemII
- How to easily detect SMBv1 scanning by using your traffic! ( by John Bronson)
- Open Source Elasticsearch Security: Using Cilium for Elasticsearch Access Control with No App/Container Changes — Cilium
- PowerShell Script to Backup / Restore Clipboard Contents | chentiangemalc
- The basics of continuous integration and delivery tools: BuildBot, CircleCI, Jenkins, Spinnaker, and Zuul | HPE
- How to Setup Django Development Environment on Ubuntu 18.04
- 26 Useful Windows Command Prompt Tricks You Might Not Know
- This Server Technology Is a Game Changer so You Better Be Ready – Blades Made Simple
- Spear Phishing Attack Prevention Best Practices and Tools
- How to Install PowerCLI on Ubuntu Linux 18.04 LTS
- Latest Fling from VMware Labs - ESXi Compatibility Checker - Eric Sloof - NTPRO.NL
- How To Become an NSX Expert in 72 Hours - ActualTech.io
- 80,000 Hours user data is affected by the Typeform data breach - 80,000 Hours
- Fibre Channel vs iSCSI: Choosing with SAN in Mind
- Microsoft Security Compliance Toolkit 1.0 | Microsoft Docs
- Revisiting wallabag, an open source alternative to Instapaper | Opensource.com
- 2018-07: OpenSprinkler, Qubes OS | KWLUG - Kitchener-Waterloo Linux User Group
- Windows Admin Center Update - New Features in latest build | ESX Virtualization
- Create an IoT sensor with NodeMCU and Lua
- How to enable all SysRq functions on Linux - LinuxConfig.org
- DIY RV Offsite Backup and Media Server | Linux Journal
- Chris's Wiki :: blog/python/SortTakesTupleKeys
- Why Automation Matters : ITIL | The ORACLE-BASE Blog
- How To Configure SSH Key-based Authentication In Linux - OSTechNix
- How to Create and Delete Virtual Machine from Command line in OpenStack
- What Is "Pseudo AI": Humans Disguised As Bots Because Manual Labor Is Cheap
- WellMess: This Go-based Malware Attacks Both Linux And Windows Machines
- 6 must-read internet standards | Opensource.com
- Tips for transitioning from Hudson to Jenkins
- A Look at Federal Student Loan Borrowing by Field of Study – Robert Kelchen
- Install Windows Admin Center (WAC) using DSC – PowerShell, Programming and DevOps
- Rob England on Twitter: "From my presentation "Project Management was the worst thing ever to happen to IT" comes 20 dysfunctions of IT project management… https://t.co/EtfuaklBd8"
- No visibility in the GDPR era, be ready for BIG fines! (by Derek Burke)
- Should I move up the ladder or stay low and technical? - part 2 - The Matrix has you...
- Chris's Wiki :: blog/sysadmin/HowWeSellStorage
- Chris's Wiki :: blog/web/POSTWithoutContentType
- Chris's Wiki :: blog/sysadmin/SSHAltPortNoSecurity
- 18c: some optimization about redo size - Blog dbi services
- Azure Kubernetes Hackfest - Day 2 - Eric’s Azure Blog
- Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
- Setting up Nginx reverse-proxy for distributed Minio S3 deployment - CormacHogan.com
- OS Hardening vs Data Protection: Is Your Data Really Safe?
- Land Your First MSP Client: 6 Tips for Managed Service Providers
- MSP Infographics: Managed IT Service Providers Survey
- Why Freedom is Essential to Security and Privacy – Purism
- Containers Break the Shared Responsibility Model Between Cloud Providers and Ops - The New Stack
- Linux With Education - Best Free Education Apps - LinuxLinks
- Why SMS should never be used as second factor - Fabio Alessandro "Fale" Locati's blog
- CentOS 6.10 Released, Scientific Linux 6.10 Coming Next Week - Phoronix
- Using Ansible to set up a workstation - Fedora Magazine
- MindForger - More Than A Notebook and Markdown IDE
- Sosreport - A Tool To Collect System Logs And Diagnostic Information
- 10 killer tools for the admin in a hurry | Opensource.com
- Weekend Reading: Python | Linux Journal
- Terrible Ideas in Git | Linux Journal
- AWS Online Tech Talks – July 2018 | AWS News Blog
- Introducing the OpenFaaS Operator for Serverless on Kubernetes
- ESXi CLIativity – Part 2 | Adventures in a Virtual World
- What is RAMPAGE Attack? Why It Affects Every Android Since 2012?
- Historical inventory of collaborative editors - anarcat
- Solution for Windows Update Error 0x800705b4 (2018-06 Cumulative Update) | Alexander's Blog
- Latest on TLBleed | Tux Machines
- Ticketmaster’s data breach - what to do next
- Pyenv - Install Multiple Python Versions for Specific Project
- How to explain blockchain in plain English | The Enterprisers Project
- Embedded software device security | Timesys Embedded Linux
- PMP Certified!
- The Vertica exam asked very little about the underlying architecture and use cases of the product and more about esoteric features and point-and-click GUI stuff. I find little value in vendor certifications and their exams when the questions are merely a marketing ruse.
- LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)
- Jekyll is so much better than Drupal and Wordpress
- Deployment Research > Research
- I Didn’t Even Know I Was Sick – Ethan Banks
- Creating connection between Azure and Amazon EC2 | geekdudes
- Wellington Home Automation Hackers | Jethro Carr
- Case Study: Scaling Your Data Scientist
- Cloud Vendor Lock-in
- LACP Configuration in vSphere 6.5 - JBcomp.com
- Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 2
- Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 1
- Summary: The Department of Homeland Security’s Cybersecurity Strategy - Lawfare
- Cilium 1.1: Istio sidecar mode, cri-o/containerd support, improved efficiency & scale, init policies — Cilium
- WSUS: Microsoft Update Catalog Import failure | Born's Tech and Windows World
- Remote security assessments in Solaris 11.4 beta | rootpool
- Seven Ways to Protect Your Organization’s Privileged Accounts - CSO | The Resource for Data Security Executives
- Private-Sector Initiatives for Cyber Norms: A Summary - Lawfare
- A Glimpse into Private-Sector Cybersecurity in Japan - Lawfare
- Tuned - Automatic Performance Tuning of CentOS/RHEL Servers
- Passive income vs. passion income ~ Get Rich Slowly
- Write an MBA-Worthy Business Plan That Will Lead You to Success
- HSA Accounts: 4 Reasons Why They Benefit Your Business
- DSHR's Blog: The Four Most Expensive Words in the English Language
- Dan Ruderman, Physicist and technologist | Cool Tools
- flashcards
- Should I move up the ladder or stay low and technical? - part 1 - The Matrix has you...
- Will IT Certifications Help My Career? - Big Data Beard
- Advanced scheduling of your patching maintenance windows - System Center Central
- Cloud Automation Boosts Revenue and Profitability | APMdigest - Application Performance Management
- Automation of endpoint security is top priority for IT pros
- Is antivirus still relevant for your organization?
- The Dark Side of Stress - The IT Hollow
- PowerShell: Hyper-V Virtual Machine Backup Utility (v4.3) – Stick To The Script
- Azure Data Architecture Guide (ADAG) | James Serra's Blog
- Connecting Azure virtual machines in different regions | geekdudes
- Create Interactive Charts with WPF and PowerShell – smsagent
- Cisco ASA: VPNs With Overlapping Subnets | PeteNetLive
- My Super Frugal Trip to Brussels, Belgium | Penniless Parenting
- Are Hypervisor's Commodity Today? — ThinkCharles.net
- Patch Lady – cleaning up on the weekend @ AskWoody
- Review: How InSpec 2.0 delivers comprehensive compliance | CSO Online
- Authenticating Customers & Identifying Fraudsters - Pindrop
- Cost savings of the cloud | James Serra's Blog
- Understanding Cosmos DB | James Serra's Blog
- PKI Infrastructure (01) – Introduction & Certificate Lifetimes | Erik Bussink
- Deployment Research > Research
- Moving to Hetzner VPS: Shorter legal docs as a competitive advantage · Ctrl blog
- Chris's Wiki :: blog/unix/XBackspaceTerminateHistory
- Chris's Wiki :: blog/sysadmin/RunningServersNotTrivial
- Chris's Wiki :: blog/sysadmin/DisablingAccountChallenge
- Chris's Wiki :: blog/solaris/ZFSDirectoriesAndChanges
- Fix: Windows 10 hangs in update installation loop | Born's Tech and Windows World
- Office 365: Zero-Font bypassing weakens email security | Born's Tech and Windows World
- Using ARA Records Ansible Within Projects - EverythingShouldBeVirtual
- GitHub - openstack/ara: ARA records Ansible Playbook runs and provides intuitive interfaces to browse them
- Samsung packs 8TB into its new PCIe 4.0 SSD sporting 3,100MB/s read speeds, more | 9to5Toys
- Terence Luk: Scoring an A grading from Qualys SSL Labs with VMware Horizon View 7.4.0 Security Server
- Fix phones, tablets, laptops, more w/ this 77-in-1 screwdriver kit for $17 Prime shipped | 9to5Toys
- Kickstarting your Z-Wave smart home: The best hubs, switches, sensors and more | 9to5Toys
- Minio S3 object store deployed as a set of VMs on vSAN - CormacHogan.com
- BCDR: Business Continuity and Disaster Recovery
- Patching Oracle Database 18.1.0 to 18.2.0 on premises
- A Quick Intro to the AWS CLI - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Creating a Database and Connecting on Oracle Cloud | EzDBA – BLOG
- Anatomy of a perfect pull request | Opensource.com
- Containers and Cloud Security | James Bottomley's random Pages
- How to Monitor Nginx Performance Using Netdata on CentOS 7
- GitHub - firehol/netdata: Get control of your servers. Simple. Effective. Awesome! https://my-netdata.io/
- How to Use OpenVAS to Audit the Security of Your Network (2/2)
- Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup - Hacking Tutorials
- Can Congress Improve Our Cyber Deterrence Posture? - Lawfare
- continuous integration should be fun
- A Platform Of A Certain Age And Respectability - IT Jungle
- Amazon Polly Plugin for WordPress Update – Translate and Vocalize Your Content | AWS News Blog
- Installing Oracle Database 18c – Upgrade your Database - NOW!
- Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 3
- Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 2
- Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 1
- Cisco Switch Configuration: an Easy and Quick Guide - RouterFreak
- Off to the Kubernetes – Networking in a Post VM world — EtherealMind
- Supply-Chain Attacks: Why the U.S. Should Worry - Lawfare
- The Cyberspace Solarium Commission: A Timely Proposal - Lawfare
- June 19 Has Been Declared National FreeBSD Day, Happy 25th Anniversary FreeBSD!
- Speeding up Cornercases | Angry Cane Ramblings
- How Linux & Open Tech Empower Medical Healthcare | It's FOSS
- My First CCIE Lab Attempt – neckercube.com
- How To Build A 4-Week Treasury Bill Ladder: A Visual Guide — My Money Blog
- Your LinkedIn Company Page Is Dull. Here Are 10 Ways to Fix That.
- Why Automation Matters : Reliability and Confidence | The ORACLE-BASE Blog
- Upgrade Oracle 12.2.0.1 to Oracle Database 18c on-premises
- Identifying & Resolving Excessive CPU Overcommitment (vCPU:pCore ratios) | CloudXC
- Linux, BSD, and everything else...: Nomadic Working with NomadBSD 1.0.1 - BSD on a stick
- Decision-Making in Self-Management Organizations Using Systemic Consensus -
- How to generate a UML diagram using Powershell And GraphViz -
- Industries Most and Least Likely to Be Disrupted in 2018 | APMdigest - Application Performance Management
- Installing macOS Mojave 10.14 Developer Beta on Proxmox 5.2 – Nicholas Sherlock
- Python Lambda script for Cleaning Up unused Amazon EC2 instances | geekdudes
- Database Migration Guide – June 2018 updates – Microsoft Data Migration Blog
- Windows Incident Response: Coding in DFIR
- Probequest - Toolkit For Playing With Wi-Fi Probe Requests - KitPloit - PenTest Tools for your Security Arsenal ☣
- My Tactical Advice for Clearing Depression - Daniel Miessler
- Chris's Wiki :: blog/linux/LinuxBootOverview
- Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast! - Security Boulevard
- Can Security be a Business Enabler? – ShiftLeft Blog
- A language to speak Dev[Sec]Ops – ShiftLeft Blog
- Here are the 2 biggest IT priorities for boards of directors - TechRepublic
- To keep pace with digital transformation, boards of directors at many companies are prioritizing cybersecurity skills, and operational risk and compliance.
The tech talent shortage is one major barrier to digital transformation success, with security and analytics skills in high demand.
- Don't Rely on Long Support Lifecycles · Lindsay Hill
- The Zero Trust Model Provides a More Proactive Approach to Security
- Group Fines Under the GDPR – Threat Stack
- AWS Security Monitoring Checklist - Security Boulevard
- Making Sense of Tomorrow’s Cybersecurity Trends
- A Totally Tubular Treatise on TRITON and TriStation « A Totally Tubular Treatise on TRITON and TriStation | FireEye Inc
- Introducing Gaum: An Open Source O/RM That isn’t an O/RM
- How Ransomware Is Changing Cybersecurity and What To Do About It - Security Boulevard
- Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty | Radware Blog
- Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty - Security Boulevard
- What is AWS PCI Compliance? – Threat Stack
- What Systems Keep You Effective? - Security Boulevard
- CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says
- PCI DSS 3.2.1 FAQs - Security Boulevard
- Cybersecurity: Protecting All the Endpoints
- Automated SQL Injection Testing of Serverless Functions On a Shoestring Budget (and Some Good Music) - Security Boulevard
- Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools - Security Boulevard
- Healthcare: Security in Crisis? - Social-Engineer.Com - Professional Social Engineering Training and Services
- How to Secure Public Cloud and DevOps? Get Unified Visibility. - Blog | Tenable™
- Cyber security - How Threat Hunters Operate in Modern Security EnvironmentsSecurity Affairs
- ICS/SCADA Smart Scanning: Discover and Assess IT-Based Systems in Converged IT/OT Environments - Blog | Tenable™
- Monitoring VPN Logins & Incorporating them to AD - Syspanda
- CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson
- Cyber Defense e-Magazines – Cyber Defense Magazine
- Cybersecurity Framework | NIST
- Updated 1.1
- Highlights from Verizon DBIR 2018 - Security Boulevard
- Identity Governance and Administration (IGA) in IT Infrastructure of Today - Security Boulevard
- GitHub - WaterByWind/edgeos-bl-mgmt: Automated updating of EdgeOS firewall network-group to be used as source address blacklist
- NBlog - the NoticeBored blog: NBlog June 14 - metrics maturity metric, mmm
- Are your Android apps sending unencrypted data? – Naked Security
- Back to Basics: Building a Foundation for Cyber Integrity - basics-building-foundation-cyber-integrity-38455
- NBlog - the NoticeBored blog: NBlog June 5 - security frameworks
- NBlog - the NoticeBored blog: NBlog June 12 - infosec priorities
- Florida leads list of states with worst cyber hygiene, New Hampshire the safest
- How to become a Linux security expert? - Linux Audit
- Bad .Men at .Work. Please Don’t .Click — Krebs on Security
- Cybersecurity Reference Architecture: Security for a Hybrid Enterprise – Microsoft Secure
- Updating your cybersecurity strategy to enable and accelerate digital transformation – Microsoft Secure
- Building Zero Trust networks with Microsoft 365 – Microsoft Secure
- The Spamhaus Project - The Top 10 Most Abused TLDs
- RDP logs and incident response - Koen Van Impe - vanimpe.eu
- DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense - KitPloit - PenTest Tools for your Security Arsenal ☣
- DejaVU - Open Source Deception Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- Why incident response planning is critical for your organisation – IT Governance Blog
- Only 24% of organisations consistency apply incident response plans – IT Governance Blog
- Wifite 2.1.0 - Automated Wireless Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks - KitPloit - PenTest Tools for your Security Arsenal ☣
- Omnibus - Open Source Intelligence Collection, Research, And Artifact Management - KitPloit - PenTest Tools for your Security Arsenal ☣
- Omnibus
- Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style - KitPloit - PenTest Tools for your Security Arsenal ☣
- Rastrea2r
- Requirements of a DPO in health and social care – IT Governance Blog
- Organisations must invest more in incident response planning – IT Governance Blog
- 5 ways to become a successful distance learning student – IT Governance Blog
- 4 tips for incident response management success – IT Governance Blog
- What are the Data Subject Rights under the GDPR? – IT Governance Blog
- GDPR: lawful bases for processing, with examples – IT Governance Blog
- JPCERT/CC Blog: How to Describe Vulnerability Information?
- Drone Forensics Gets a Boost With New Data on NIST Website | NIST
- Infosecurity.US - Web Log - The First Cyberattack
- The 3 Must Knows of Sandboxing
- Building a Strong, Intentional and Sustainable Security Culture
- 4 Cybersecurity Tips for Staying Safe During the World Cup
- Implementing appropriate security under the GDPR
- How to Protect Your DNS Privacy on Ubuntu 18.04 with DNS over TLS
- How not to write your GDPR-'compliant' data protection notice
- One-third of healthcare CIOs 'still on the journey' to comply with GDPR privacy rules
- Security Ratings Answer Big Questions in Cyber ...
- Understanding data processors’ ISO and SOC 2 credentials for GDPR compliance
- ISO explained
- Facebook, Google Targeted Among 19 Pan-EU Privacy Complaints - Bloomberg
- Bash tips for everyday at the command line | Opensource.com
- A complete 5G standard is finally here
- 15 Best Security Podcasts For You
- Should the FDA Create a Cybersecurity Measuring Stick?
- Linux Privilege Escalation using LD_Preload
- Evil Tester: Notes on Shift Left in Testing and Software Development
- The L0pht Legacy - The Ethical Hacker Network
- Medical Device Cyber Vulnerabilities: More Alerts
- How to Use the NIST Cybersecurity Framework - HealthcareInfoSecurity
- Congress Considers Ways to Beef Up Healthcare Cybersecurity
- Erik Decker
- The best free cultural & educational media on the web | Open Culture
- Read This Before Signing Up for a Programming or Coding Course!
- Using PowerShell to report on thousands of Microsoft SQL Instances & Databases – Virtually Sober
- These 10 Security Experts Are Making Your Life More Secure
- Neat Odroid & GlusterFS Build Stashes Data, Sips Power | Hackaday
- StarWind Free Virtual Tape Library (VTL) | ESX Virtualization
- Meet 'Bro': The Best-Kept Secret of Network Security
- 15 Octave Commands Every Data Scientist Must Know - Big Data Beard
- Security metrics you need for the board | CSO Online
- Ubunsys - An Advanced System Configuration Utility For Ubuntu Power Users - OSTechNix
- Welcome to NTPsec
- Open Social Security: Free, Open-Source Social Security Calculator
- The GDPR initiative and how it affects US government and industry | CSO Online
- Modern Cybersecurity Demands a Different Corporate ...
- Security and Privacy Are Not As Different As People Think - Daniel Miessler
- Managed Service Providers vs In-House IT Administrators
- How to Configure ESXi Unattended Installations: Part 2
- What is the New York Cybersecurity Regulation? What you need to do to comply | CSO Online
- Generating a docs website powered by Git & Markdown – Karim Vaes
- NSE Scripts – More Than Scanning | CQURE Academy
- Difference Between Multi-Factor Authentication and Multi-Step Authentication | Alexander's Blog
- Integrity and ethics in IT | The IT Skeptic
- ODROID-HC2 as an entry-level NAS | Logan Marchione
- The Life of Kenneth: Peering with Root DNS Servers
- PowerShell Practice Makes Perfect
- Look who's coming to Raspberry Fields 2018! - Raspberry Pi
- Build your own weather station with our new guide! - Raspberry Pi
- Synchronize your watches | Seth's Blog
- CrowPi: Raspberry Pi Experimenters Kit Review (With RTL-SDR and RPiTX Tests) - rtl-sdr.com
- Working with JSON data in PowerShell – Kory Thacher
- App Service Diagnostics – Profiling an ASP.NET Web App on Azure App Service | Azure App Service Team Blog
- DSC Resource Kit Release June 2018 | PowerShell Team Blog
- joeware – never stop exploring… :) » Blog Archive » Non-Expiring IDs Redux
- ITAR Compliance: Guidelines for Companies Dealing with USML
- NAT discussions, fact checking, and debate - The Forwarding Plane | The Forwarding Plane
- Network Labs Using Nested Virtualization in the Cloud | Open-Source Routing and Network Simulation
- Why Automation Matters : Lost Time | The ORACLE-BASE Blog
- IT decision makers limit cloud use due to difficulties with compliance
- New solution helps secure infrastructure across OT and IT environments
- Why Nonprofit Workplaces Are Stressful and What To Do About It | Beth's Blog
- What Is a Breadboard and How Does It Work? A Quick Crash Course
- Center for Humane Technology
- Chotto: A Little Japanese Word with 7 Different Meanings
- VMware's Accidental Containerization Hero
- Microsoft May 2018 Security Update CredSSP Issue
- ADB Exploit Leaves Thousands Of Android Devices Exposed To Attackers
- Microsoft and friends need to explain why always-connected PCs make sense
- ACPC
- Restaurant Style Pasta with Three Cheese Sauce Recipe -- Easy, Gluten Free, and Delicious | Penniless Parenting
- The four-percent rule for safe withdrawals during retirement
- 7 Tips for Issuing an Effective Press Release
- Windows Server 2019 What's New - Insider Preview Build 17666 | ESX Virtualization
- Want Your Child To Eat (Almost) Everything? There Is A Way : The Salt : NPR
- Using KSQL, Apache Kafka, a Raspberry Pi and a software defined radio to find the plane that wakes…
- XenServer PowerShell – New Windows VM from ISO | Ask the Architect
- Why You Should Use Windows Subsystem for Linux -- Virtualization Review
- Hacking When It Counts: The Magnetron Goes to War | Hackaday
- Understanding Cosmos DB | James Serra's Blog
- Bacula enterprise backup: Review - ITSMDaily.com
- A Better Way to Hire & Scale Your Team
- AMA: Do You Worry About Your Career? | Don Jones
- A third of IT professionals don't know how many endpoints they manage
- 71 percent of IT pros believe they can hack any organization
- DevOps Balanced Scorecard Dashboard | The IT Skeptic
- Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)
- Is your network provider peered with Microsoft? - Tom Talks
- Office 365 Connectivity Guidance – On The Wire
- Gartner: Digital Workers Think Management is Out of Touch with Technology | APMdigest - Application Performance Management
- Cisco Stacking 2960-X Catalyst Switches | PeteNetLive
- The Future Isn’t In Databases, But In the Data - Thomas LaRock
- Advanced Standalone Kubelet tutorial for Raspberry Pi - Povilas Versockas
- How to find the Windows Experience Index in Windows 10 with Powershell – jasoncoltrin.com
- Deployment Research > Research
- ZPAQ
- GDPR: Continental bans WhatsApp & Snapchat | Born's Tech and Windows World
- In Memory Performance, Hyperconverged Simplicity – SAP HANA Validated on Nutanix AHV | Long White Virtual Clouds
- Chris's Wiki :: blog/unix/SbrkVersusMmap
- Lynis – Automated Security Auditing tool for Linux Servers
- Quick tip: Testing volume licensing activation by a KMS | >_
- A Quadruple-Provider Vagrant Environment - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Need Help with Oracle Security GDPR Training and Services
- Massive Delete | Oracle Scratchpad
- Exploring Kubernetes with Kubeadm, Part 1: Introduction - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Half-baked ideas: Server remote management with an RPi Zero | Richard WM Jones
- Slow network throughput between Ubiquiti EdgeRouter VLANs - IVOBEERENS.nl
- CCNA Training » CCNAv3 – New Questions Part 2
- RedEye Ransomware Destroys Your PC Files If Payment Isn't Made
- Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
- HDD and SSD Maintenance Checklist
- ESXi boot fatal error 33 inconsistent data | Adventures in a Virtual World
- Explaining your "Why" | Opensource.com
- Why You Need To Understand Your Software Supply Chain
- Read Ebooks Quicker With This Spritz-Like Fast Reading Command Line Software - Linux Uprising Blog
- How this media company became the first to broadcast entirely on Linux | Opensource.com
- Five Free Open Source Testing Tools You Can Trust | Information Security Buzz
- Standup report: June 8th, 2018 | Will's blog
- Homemade Cashew Based Hummus Recipe --- Paleo, Vegan, and Easy | Penniless Parenting
- Hummus Recipe
- Volume Shadow Copy Service: Overview and Troubleshooting
- SAP on AWS – Past, Present, and Future | AWS News Blog
- Amazon EKS – Now Generally Available | AWS News Blog
- FCC shrugs at fake cell towers around the White House
- Using MQTT to send and receive data for your next project | Opensource.com
- Citellus: Validate your deployments
- Creating a Wildfly cluster for load-balancing in Linux - LinuxTechLab
- How to Monitor Apache Performance using Netdata on CentOS 7
- Atlanta ransomware attack may cost another $9.5 million to fix
- Censorship in the Age of Large Cloud Providers - Lawfare
- How Apple Programmer Sal Soghoian Got Apps Talking to Each Other | WIRED
- How to Build an Amazon Echo with Raspberry Pi - Make Tech Easier
- Open Source Kata Project Improves Security With Virtualized Containers
- Data Privacy: Why It Matters and How to Protect Yourself | Linux Journal
- An Inside Look at OpenStack Security Efforts
- procinfo - Shows System Statistics from /proc Filesystem
- A Starter Collection of Blockchain Explainers | DennisKennedy.Blog
- The Fifth Anniversary of the Snowden Disclosures - Lawfare
- Make a $6 Tiny Portable Weather Station that Transmits Live Data Wherever You Are
- 18650 control boards
- How to dismantle a compiler bomb | Code Explainer
- The Importance of Using SIEM for GDPR Compliance - Security Boulevard
- CISSP Official Study Guide 8th Edition - What's new
- Think You’ve Got Your Credit Freezes Covered? Think Again. — Krebs on Security
- NCTUE
- Rethinking the “Lessons” of the First World War - Lawfare
- Working with Ansible and AWS EC2, SG, ASG and ELB tags - Alex Scoble's IT Notes - An Information Technology Blog
- NPM Fails Worldwide With "ERR! 418 I'm a Teapot" Error
- Announcing Federal Security and Compliance Controls for Docker Datacenter - Docker Blog
- You receive a "logon failure: unknown user name or bad" error message while accessing remote security-enhanced resources from an ASP.NET application
- TigerText now TigerConnect | Clinical Communication Solutions
- Products · NRS Systems
- Binmap: a system scanner
- How to: Login to your Microsoft Azure Subscription using Powershell «
- How big is the Microsoft Azure Cloud? «
- List all VM sizes in Microsoft Azure per Location «
- 3 Tools for Automating Deployments in the Era of the Modern Hybrid Cloud «
- VulnDB
- Why there are at least 6,000 vulnerabilities without CVE IDs | Synopsys
- Script to Reset WSUS for SysPrep’ed Image – Random Musings of Jeremy Jameson
- Adamj Clean-WSUS Powershell Script : sysadmin
- Clean Up WSUS the Easy Way - Step by Step
- Script Reset WSUS Authorization and get new WSUS SID
- Script Reset Windows Update Agent
- GitHub - strongdm/comply: Compliance automation framework, focused on SOC2
- The State of ICS: One Year Into the Cyber Executive Order
- Security: Getting Off the Patch - The Shining Hope - Security Boulevard
- SecMon State of the Union: Refreshing Requirements - Security Boulevard
- Security: Getting Off the Patch - The Shining Hope
- Crashing HDDs by launching an attack with sonic and ultrasonic signalsSecurity Affairs
- The Ultimate Guide to CompTIA’s Security+ Certification - Security Boulevard
- The Security+ CBK Domains: Information And Updates - Security Boulevard
- GDPR Is Affecting the Way WHOIS Works, Security Researchers Worry
- What GDPR Compliance means to the IT Security Professional - Security Boulevard
- 50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts – Threat Stack
- Home
- Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
- Developing GDPR compliant applications, Part 2: Application privacy by design
- Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
- Manage your fleet’s firewalls with osquery | Trail of Bits Blog
- Back to basics: What sysadmins must know about logging and monitoring | HPE
- The crooked timber of humanity | 1843
- Resetting Your Router the Paranoid (=Right) Way - Resetting Your Router the Paranoid (=Right) Way
- Binary analysis with Radare2 - Binary analysis with Radare2
- Radare2
- Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups - KitPloit - PenTest Tools for your Security Arsenal ☣
- Prowler - Distributed Network Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - trimstray/otseca: Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
- What goes in an incident response plan? – IT Governance Blog
- 5 tips to thwart medical device attacks | CSO Online
- Evil Tester: Google Advanced Searches - Google Dorks
- How to implement an ISMS aligned with ISO 27001 – IT Governance Blog
- PCI DSS compliance made easier – IT Governance Blog
- How to Prevent Cloud Configuration Errors
- Sysadmin Stories: PowerCLI - Get the sizing of virtual machines
- I/O Analyzer
- 13 tools for checking the security risk of open-source dependencies
- Librarians, Meet Your Motherboard » Public Libraries Online
- Ready, Set, Negotiate! Preparing for Successful Contract Talks » Public Libraries Online
- Observation, Orientation, Decision, Action Applying the OODA Loop Concept to Libraries » Public Libraries Online
- Teaching Technology » Public Libraries Online
- Windows Server 2012 R2 – Uninstalling .Net Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.71 – the Connector Space
- Using the server_stats command on Celerra / VNX File - THE SAN GUY
- Gathering performance data on a virtual windows server - THE SAN GUY
- Scripting automatic reports for Isilon from the CLI - THE SAN GUY
- Meet Aptomi: An application delivery engine for Kubernetes - Superuser
- Isilon Port Usage - THE SAN GUY
- Default Passwords - THE SAN GUY
- Minikube: Try Kubernetes on Windows without headaches – Marksei
- Spanning The Tree : Dr Radia Perlman & Untangling Networks | Hackaday
- ESXi CLIativity – Part 1 | Adventures in a Virtual World
- An inside look at Google’s hiring and onboarding processes
- How to Configure ESXi Unattended Installations: Part 1
- Counting Bees With A Raspberry Pi | Hackaday
- Red Hat's only business plan is to keep changing plans | ZDNet
- Effects of Bring Your Own Device (BYOD) On Cyber Security
- Amazon Web Services Networking Overview « ipSpace.net by @ioshints
- dbKoda | dbKoda is the open-source, next generation IDE for MongoDB. Take your database to the next level with our Rich Code Editor, Multiple Connection Management and Topology Tree Explorer.
- Systematic MongoDB performance tuning – dbKoda – Medium
- Introducing SQL Server on Kubernetes - Blog dbi services
- Semi-Automatic LaTeX: KDE’s Kile | OCS-Mag
- OpenStack Summit Vancouver: Automating the data centre | Ubuntu blog
- Kubernetes recipes: Maintenance and troubleshooting - O'Reilly Media
- BPFILTER Landing For Linux 4.18 For Eventually Better Firewall / Packet Filtering - Phoronix
- Paleo Vegan Tzatziki Recipe -- Mediterranean Yogurt Cucumber Sauce | Penniless Parenting
- What is zchunk?
- How to Monitor Your Linux Servers Performance with Glances Tool
- Red Hat Summit: Building production-ready containers - RHD Blog
- 10 7zip (File Archive) Command Examples in Linux
- Notes On Installing CentOS 7 Server – levlaz
- Hewlett Packard Enterprise Grows Compute Business as Private Cloud Opportunities Advance
- Microsoft OneDrive for Business Review: Pros and Cons
- Building an 90° angular power adapter for the C64 | 0xf8.org
- "How much house can I afford?"
- Top 5 Consumer Tips for Your Credit Report - Law and Daily Life
- Can an Employer Check Your Credit Score? - Law and Daily Life
- Nutanix Resiliency – Part 2 – Converting from RF2 to RF3 | CloudXC
- Nutanix Resiliency – Part 1 – Node failure rebuild performance | CloudXC
- Block Ads & Malvertising on pfSense Using pfBlockerNG (DNSBL) - Linux Included
- DNS is Changing. Are you Ready? - DNS is Changing. Are you Ready?
- Giving a Presentation? How to Impress Your C-Level Audience
- Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch - KitPloit - PenTest Tools for your Security Arsenal ☣
- How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score
- List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked – IT Governance Blog
- Ten Best Practices for Outsmarting Ransomware
- Sia Load Test Wrap-up | Space Duck
- Abusing IVR Systems - Legacy Telecom [CVE-2018-11518]Security Affairs
- Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
- “Free” Memory Sticks can be Expensive
- Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords
- USING POWERSHELL TO BACKUP SQLSERVER DATABASES
- Don’t Be GDPR Complacent, It’s Time to Get Compliant - Security Boulevard
- Does your organisation rely too heavily on technology? – IT Governance Blog
- What does a ransomware attack cost? Beware the hidden expenses | CSO Online
- A Gorgeous Guide to the First Wave of Personal Computers - Motherboard
- Collect NTFS forensic information with osquery - Security Boulevard
- Pathways to an Enterprise Security Architecture (ESA) | Security Architects Partners
- NBlog - the NoticeBored blog: NBlog May 11 - mind remapped
- NBlog - the NoticeBored blog: NBlog May 19 - PRAGMATIC security metrics
- NBlog - the NoticeBored blog: NBlog May 25 - GDPR day
- Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-focus-first-cis-critical-security-controls-38395
- 10 Endpoint Security Problems Solved by the Cloud - 10-endpoint-security-problems-solved-cloud-38415
- The Untold Story of Japan’s Secret Spy Agency
- Completing the vSphere vCenter Appliance Hardening Process | slice2
- HOWTO quickly STIG Firefox 59.01 | slice2
- ESXi Compatibility Checker
- GDPR Hall of Shame
- Cybersecurity salaries highest in retail sector
- Securing the modern workplace with Microsoft 365 threat protection – part 4 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 3 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 2 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 1 – Microsoft Secure
- DHS Cybersecurity Strategy | Homeland Security
- Cyberattack map shows impacted U.S. school districts
- Fiber Cable | Nbctcp's Weblog
- Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
- [LFCS] Commands to manage and configure containers in Linux – //Cloud notes from my desk
- Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- FreeRADIUS Server Configuration Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name - KitPloit - PenTest Tools for your Security Arsenal ☣
- Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- Open Source Security Podcast
- Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security and Human Behavior (SHB 2018) - Schneier on Security
- USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
- GDPR compliance checklist for healthcare – IT Governance Blog
- Business Continuity Awareness Week (BCAW) – Free BCM resources – IT Governance Blog
- Galileo - Web Application Audit Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API - KitPloit - PenTest Tools for your Security Arsenal ☣
- Burpa - A Burp Suite Automation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Where does data flow mapping fit into your GDPR compliance project? – IT Governance Blog
- Two Ways To Be A Parent: Insights From The Author Of 'The Gardener And The Carpenter' : Goats and Soda : NPR
- Magic Mirror Tirelessly Indulges Children’s Curiousity | Hackaday
- Cyber security incidents are becoming more common and harder to resolve – IT Governance Blog
- CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
- Vulnerability Management: So Much More Than Just Patch Management
- Deployment Research > Research
- From Cambridge Analytica to GDPR: Enter digital supply chain management
- HITRUST Unveils Certification for NIST Cybersecurity Framework
- HITRUST releases NIST Cybersecurity Framework certification program
- Ask the DPO Web Conference Series
- The AWS Bucket List for Security
- SOC Automation: Good or Evil?
- The 13 Step Guide to Secure Your PC After a Fresh Windows Installation [Updated]
- Linux Privilege Escalation using Sudo Rights
- Healthcare Exchange Standards: Erasure Receipt
- Healthcare Exchange Standards: GDPR on FHIR
- Smashing Silos and Building Bridges in the ...
- US Government Cybersecurity at a Crossroads
- Hacking Articles - Raj Chandel's Blog
- The Modern Day Hacker – A Cautionary Tale - The Ethical Hacker Network
- 7 Tools for Stronger IoT Security, Visibility
- Get Ready for 'WannaCry 2.0'
- What Israel's Elite Defense Force Unit 8200 Can ...
- GDPR 101: Keeping Data Safe Throughout the 'Supply ...
- A Data Protection Officer's Guide to the Post-GDPR ...
- GDPR, WHOIS & the Impact on Merchant Risk Security ...
- Clint Boessen's Blog: 432 4.3.2 STOREDRV.Deliver recipient thread limit exceeded
- Pi serial adaptor | Facelesstech
- Harrowing Story of Installing Libreboot on ThinkPad | Hackaday
- Atari co-founder Ted Dabney dies
- List of Shark Tank Contestants
- 11 ways to hack 2FA | CSO Online
- Security Report Analysis: 2018 DBIR Report - Daniel Miessler
- What SSH Hacking Attempts Look Like – Doug Rickert – Medium
- Best certifications to get - The Silicon Underground
- LOADays
- OWASP DefectDojo Project - OWASP
- Linked - IBM bans all removable storage, for all staff, everywhere
- GDPR : The good, the good and the good! | The ORACLE-BASE Blog
- Computer security principles » Gofore
- Brendan Tierney - Oralytics Blog: Creating a Word Cloud using Python
- GitHub - rShetty/awesome-podcasts: Collection of awesome podcasts
- Decoding and Listening to HD Radio (NRSC-5) with an RTL-SDR - rtl-sdr.com
- YouTube Talk: Investigating RF Controls with RTL-SDR - rtl-sdr.com
- Naturebytes' weatherproof Pi and camera case - Raspberry Pi
- Continued: the answers to your questions for Eben Upton - Raspberry Pi
- PR-Holonet: Disaster Area Emergency Comms | Hackaday.io
- PR-Holonet
- Strengthening cybersecurity for the DoD – accelerating compliance – Azure Government Cloud
- Hey DBAs! Powershell is your friend! – Stefano Altamura’s Blog
- Windows Server Performance Tuning Guidelines – Brad Chen's SQL Server Blog
- Why GDPR is a $3.5 billion business opportunity – Microsoft Partner Network Blog
- How to set up a Virtualization Host using KVM on Ubuntu – Marksei
- How to Make Windows Speak the Time Out Loud Every Hour
- 5 Ways to Generate a List of All Installed Programs in Windows
- Windows Keyboard Shortcuts 101: The Ultimate Guide
- How to Keep Ethernet, TV, and Power Wires Tidy Using Cable Covers
- Making Sense of USB-C and Thunderbolt Cables and Ports on Your MacBook
- 10 Essential Vivaldi Browser Tips & Tricks for Speed and Productivity
- The Internet of (Medical) Things: Dangers, Risks, and Security Problems
- Why You Should Be Concerned About the EU's New CPC Law
- DNS Propagation Checker - ViewDNS.info
- Why modernize your datacenter if you are cloud first? | Virtual Me
- Passing the AWS Certified Developer – Associate Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert @PSIServicesLLC – vMusketeers
- Everything You Need to Know About Raspberry Pi GPIO Pins
- The scientific methodology for troubleshooting SharePoint | SharePoint Dragons
- Auto-generated infrastructure node graphs from Terraform plans - Skelton Thatcher
- A Better Way of Visualizing Microservice Architecture
- A free e-learning tool for creating digital content | Opensource.com
- Chris's Wiki :: blog/linux/ReplacingNetstatNotBad
- 15 books for kids who (you want to) love Linux and open source | Opensource.com
- FOSS as a Part of a Corporate Sustainability Plan | Linux Journal
- Zammad - An Open Source Help Desk and Support Ticket System
- 8 Policy Changes to Improve Your Business’s Security
- GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape - Lawfare
- Sorting Through GDPR: What to Watch After May 25 - Lawfare
- BBC - Culture - The 100 stories that shaped the world
- Speculative Store Bypass: spectre for browsers, the nightmare isn't over yet – Marksei
- Is Training The Enemy of Progress? | The Networking Nerd
- Culture Shifts and Work Travel Learnings · Lindsay Hill
- Router on a Stick: Intro & Configuration (with lab files) - RouterFreak
- Rethinking motivation and engagement in the open organization | Opensource.com
- Journal of Azuma Hazuki (5086)
- Adding Value to Risk Management Activities With Open Source Tools
- Digitizing my DVDs
- DOTmed.com - Boston Children's Hospital quickens medical image processing in RedHat and MOC collab
- Which Programming Languages Use the Least Electricity? - The New Stack
- Debian-goodies - A Set Of Useful Utilities For Debian And Ubuntu Users - OSTechNix
- GitHub - tryolabs/luminoth: Deep Learning toolkit for Computer Vision
- An FUQ for the GDPR | Linux Journal
- How to Run Your Own Git Server | Linux.com | The source for Linux information
- How to Install TeamSpeak Server in CentOS 7
- Circuit VR: Sink or Swim with Current Sources | Hackaday
- Ask Hackaday: Whatever Happened to Wire Wrapping? | Hackaday
- Printed Circuits In The Palm Of Your Hand | Hackaday
- Printed It: Toolbag Essentials | Hackaday
- Harmony Hub Hacked and Patched | Hackaday
- Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc
- HFT On HF, You Can’t Beat It For Latency | Hackaday
- 3D Printing Air Quality Study | Hackaday
- Getting ready for GDPR with Office 365
- 7 ways we have improved our core code base
- 100 percent of organizations have active insider threats
- The Electrical Outlet and How It Got That Way | Hackaday
- Poor mans Bash Bunny – Cron Blog – My personal findings
- Richard Feynman: A Life Of Curiosity And Science | Hackaday
- How Hertha Ayrton Enabled the Titanic to Call SOS | Hackaday
- Hertha Ayrton
- Cloud computing may finally end the productivity paradox
- Half of employees not aware of their company's GDPR preparations
- Microsoft will roll out 'key' GDPR rights globally... not just in Europe
- Chris's Wiki :: blog/tech/DangerousRegistration
- Windows Server Status Monitor (Update Version 1.4) – Stick To The Script
- Economist Bryan Caplan thinks education is mostly pointless showing off. We test the strength of his case. - 80,000 Hours
- UK Decision Makers Unsatisfied with IT Vendor Service | APMdigest - Application Performance Management
- How to stay on top of home improvement ~ Get Rich Slowly
- Pure//Accelerate 2018 – Thursday General Session – Rough Notes | penguinpunk.net
- Sandpits in enterprise data protection » NetWorker Information Hub
- Just one more esxi-guy: vSAN Cluster via PowerCli
- How-To Create a Training Class Through Ravello Training Platform | ESX Virtualization
- pasta salad with roasted carrots and sunflower seed dressing – smitten kitchen
- Slacking Away on vSAN — ThinkCharles.net
- AsteroidOS and OpenWatch Aim to Open Up Smartwatch Market | Linux.com | The source for Linux information
- OpenWatch
- Using Stratis to manage Linux storage from the command line | Opensource.com
- Zuul - A Project Gating System — Zuul documentation
- dbachecks – Save the results to a database for historical reporting | SQL DBA with A Beard
- HP 3PAR CLI Reference Guide - THE SAN GUY
- Multi-tier load-balancing with Linux | Vincent Bernat
- AppDynamics for SAP Released | APMdigest - Application Performance Management
- Windows 10: End of Life for several builds | Born's Tech and Windows World
- How cool is this: EMC’s Recoverpoint goes INSIDE vSphere!
- The Complex Taxation of America’s Retirement Accounts - Tax Foundation
- A newbies guide to ELK - Part 4 - Filtering w/ Grok - mwpreston.net
- Engage 2018, some HUGE announcements and the OGS Replay
- Chris's Wiki :: blog/tech/NoPersonalInfrastructure
- Stop wasting time developing SharePoint Training Manuals - SharePoint Maven
- Suing to Get a 30-Yr-Old Child Out of Your House - Law and Daily Life
- Spotify's GDPR updates add privacy and data download tools
- 'Japan Sales Mastery:' Lessons from 30 years in Japan - Japan Today
- After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
- VeeamON 2018 Recap | TinkerTry IT @ Home
- Motivation: Take Advantage Of Being 29, 39, 49, or 59 Years Old — My Money Blog
- Windows 10 Upgrade/Servicing tools demoed at MMS 2018 – CCMEXEC.COM – Enterprise Mobility
- I am Disappointed in Frontier Communications - Patshead.com Blog
- Google and Microsoft unveil Spectre V4 CPU vulnerability | Born's Tech and Windows World
- 7 Places to Find Free or Cheap Groceries
- How to Write a Great Resume as a Business Professional
- Intel details fourth Spectre-style CPU security flaw
- 6 Key Pointers for Running Your Virtual Machine Safely
- Training Programs: The Secret to Business Success
- Chris's Wiki :: blog/tech/NFSMyMetricsSplit
- Analyzing Large Capture Files Part 2 – Protocol Hierarchy – Chris Sanders
- PeteNetLive - KB0000515 - VMware - Cannot Cut, Copy, or Paste to and from VM's | PeteNetLive
- Windows: Finding Stale User and Computer Accounts | PeteNetLive
- Visibility is Security | APMdigest - Application Performance Management
- What are Thresholds for Good and Poor Network Packet Loss, Jitter and Round Trip Time for Unified Communications? - Tom Talks
- Use Powershell to Get a List of Users with Out of Office enabled in Outlook Office365 – jasoncoltrin.com
- Windows Download - #1 Windows ISO Download Source
- Generating Good Passwords, Part I | Linux Journal
- States and Their Proxies in Cyber Operations - Lawfare
- Weekend Reading: Backups | Linux Journal
- Speeding Up Netfilter (by Avoiding Netfilter) | Linux Journal
- Security and privacy reminder: Spring clean your systems | Opensource.com
- ‘Crush Them’: An Oral History of the Lawsuit That Upended Silicon Valley - The Ringer
- You-Get - A CLI Downloader To Download Media From 80+ Websites
- After Four Years, AsteroidOS Open-Source Smartwatch OS Is Ready for the Masses
- AsteroidOS
- Red Hat Virtualization 4.2 Adds New High-Performance, SDN Features
- Fixing Disk Signature Collisions – Mark's Blog
- Schedule Task Monitor Script
- Why You Need Cloud Data Backup: Cloud Storage Weaknesses Explained
- IoT for Managed Service Providers: Challenge or Opportunity?
- DSHR's Blog: Prof. James Morris: "One Last Lecture"
- Amazon.com: Charles Platt: Books
- DeployHappiness | The One and a Half Year Bachelor’s Degree for Less Than Free
- 19 Things You Should Make Your Kids Pay For
- Here Are 11 Reasons We Have An Umbrella Liability Insurance Policy — My Money Blog
- Hierarchy of Financial Needs (and the Meaning of Life) | Mad Fientist
- Philippines to integrate open-source electronic medical record platform for enhanced health programs | OpenGovAsia
- Healthcare Open Source Projects Speed Up Technology Adoption
- What Is EVPN? « ipSpace.net by @ioshints
- Kickstart Scripted VMware ESXi Install to USB Media – Michelle Laverick…
- Configuration vulnerability could leave SAP systems open to compromise
- If Facebook had been GDPR compliant would things have been different?
- 73 percent of industrial networks are vulnerable to hackers
- The rise of the experimentation team
- How managed services can help businesses with GDPR [Q&A]
- Younger generations lack understanding of cybersecurity careers
- 18 useful financial rules of thumb ~ Get Rich Slowly
- How the Father of Computer Science Decoded Nature’s Mysterious Patterns - The New York Times
- Ευάγγελος Μπαλάσκας - USBGuard » Evaggelos Balaskas - System Engineer
- Terratest - an Open Source Go Library for Automated Infrastructure Testing
- Perfect Gluten Free Vanilla Cake Recipe -- Allergy Friendly, Dairy Free, Vegan Option | Penniless Parenting
- Ring doorbell flaw lets others watch after password changes (updated)
- Securosis - Blog - Article
- Introducing vSphere 6.7 Security - VMware vSphere Blog
- Cyber Exposure Meets Political Practicality - Blog | Tenable™
- How to Secure and Audit an Amazon Web Services Three-tier Web Architecture - Blog | Tenable™
- Critical Oracle WebLogic Server Flaw Still Not Patched - Blog | Tenable™
- Virtual Instruments Releases VirtualWisdom 5.6 | APMdigest - Application Performance Management
- VirtualWisdom
- Skype for Business to Microsoft Teams Roadmap Update April 23, 2018, 9 Changes - Tom Talks
- The Office 365 train is still steaming along with more than 135 million monthly active users, Microsoft FY18 Q3 Results - Tom Talks
- Labeling endpoint actions with Logstash - Threat Hunting - Syspanda
- Zero Day Initiative — The May 2018 Security Update Review
- What does a CISO actually do? | Thom Langford
- State Machine Testing with Echidna | Trail of Bits Blog
- Windows Incident Response: EDR Obviates Compliance
- Barebone Kickstart setup for CentOS 7 | Velenux Home Page
- IT Monitoring Changing in 2018 | APMdigest - Application Performance Management
- Catchpoint Releases Free Benchmarking Service | APMdigest - Application Performance Management
- The STEM Pipeline: What Can You Do? | Webroot
- Importing McAfee ePO Threat events to ELK - Syspanda
- Monitoring Active Directory with ELK - Syspanda
- VMware PowerCLI - Create Port Groups Script
- VMware PowerCLI - Copy Port Groups Script
- How to thrive at a technical conference - major.io
- The Advent of the Fourth Wave of Computing - Netronome
- Why Bare Metal Does Not Have To Be Nude - Netronome
- The Case for Express Virtio (XVIO) – Part 2 - Netronome
- The Case for Express Virtio (XVIO) – Part 1 - Netronome
- Zero-Trust Security for Cloud Data Centers – How Much Does it Cost? - Netronome
- Samba login using windows AD on Centos 7 | SvennD
- An Updated Look at My Multi-Platform Toolbelt - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- Our preparations for Europe’s new data protection law
- Data Collection: How To Gather Meaningful Data - Thomas LaRock
- Don't run away from The System, learn to bend it to your advantage - The Matrix has you...
- NIST Updates Risk Management Framework to Incorporate Privacy Considerations | NIST
- First EU cybersecurity law takes effect—with new fines for misbehaving companies – EURACTIV.com
- Is the Irish DPC fit for purpose?
- Building A Windows 10 1803 (April 2018 Update) Reference Image with MDT – Stick To The Script
- Free stock photos · Pexels
- Google outlines GDPR-compliance efforts
- Calculating Cloud Cost: 8 Factors to Watch
- 20 Signs You Are Heading for a Retention Problem
- Why GDPR is Every Security Professional’s Dream - Delta Risk
- Failure without Consequences after Breach - The Ethical Hacker Network
- How to Avoid Bad Clients: 12 Red Flags I Look for to Dodge Nightmare Projects
- Google Online Security Blog: Google CTF 2018 is here
- 'All of Us' Research Project: The Privacy Risks
- Is Converging Your IT and OT Networks Putting Your Organization at Risk? | CSO Online
- Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance | CSO Online
- The rise of the NIST cybersecurity framework | CSO Online
- PowerShell mouse jiggler | Logan Marchione
- Install Python On Windows With A One-Liner - krypted.com
- LasLabs Blog | Storing SSH keys in Active Directory for easy deployment - LasLabs Blog
- LasLabs Blog | Managing SSH Keys Stored in Active Directory - LasLabs Blog
- The Idiot uses Grafana and Influxdb to monitor Proxmox – Jon Spraggins
- Resolved: "Permission denied (publickey)." when trying to access via ssh an Ubuntu Server - Knowledge eXchange
- How to store your ssh public key in a different directory - Knowledge eXchange
- Deployment Research > Research
- Find the repository of all installed packages on Debian or Ubuntu | /contrib/famzah
- Time To Get Back To Basics? | The Networking Nerd
- Packets over a LAN are all it takes to trigger serious Rowhammer bit flips | Ars Technica
- Quick tip: What new products and classifications have been added in the past 30 days to WSUS? | >_
- Doc Searls Weblog · GDPR will pop the adtech bubble
- Career Certification Strategy – vcdx133.com
- vRA Design Considerations – vcdx133.com
- VCDX – Exam Techniques – vcdx133.com
- Deploying vSphere Virtual Machines using Ansible
- vSphere Design Considerations – vcdx133.com
- VSAN Maintenance Mode with PowersHell – Michelle Laverick…
- MSP Backup Pricing Guide: Tips and Strategies
- Red Hat Certification Guide: Overview and Career Paths
- 5 Awesome Open Source Cloning Software - nixCraft
- Spectre, Meltdown made industry collaborate: Red Hat - Security - CRN Australia
- A look at open source image recognition technology | Opensource.com
- Terraform by HashiCorp
- Maximizing Value from Open Source Testing Frameworks - The New Stack
- GitHub - axsh/openvdc: Extendable Tiny Datacenter Hypervisor on top of Mesos architecture. Wakame-vdc v2 Project.
- OpenVNet
- Axsh | Cloud Technology and Network Virtualization
- 18 Tips & Tricks To Speed Up Windows 10 And Make It Faster
- Everything You Need to Know about the Cloud and Cloud Computing, Part I | Linux Journal
- How Misinformation Spreads on Social Media—And What To Do About It - Lawfare
- Keynote: Crossing the River by Feeling the Stones - Simon Wardley - vNinja.net
- VCDX – Throwing Bones – vcdx133.com
- VCDX Journey – Part 3 – Design Scenario – vMusketeers
- VCDX Journey – Part 2 – Where I Messed It Up – vMusketeers
- VCDX Journey – Part 1 – Lessons Learned – vMusketeers
- My VCAP-DCV 6.5 exam experience – VCDX6 in the pocket | viktorious.nl – Virtualization & Cloud Management
- Performance Checklist now available for vSAN benchmarking - CormacHogan.com
- Automate Performance Monitor Statistics Collection for SQL Server and Windows
- Finding ESXi iLO/iDrac Information with PowerCLI
- Making a little nest for your VMs – Michelle Laverick…
- Upgrade Raspbian Jessie to RaspbianStretch | Marco Franssen
- 10 “Notes to Self” that Will Stop You from Taking Things Personally
- RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
- WSSAT v2.0 - Web Service Security Assessment Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Astra - Automated Security Testing For REST API's - KitPloit - PenTest Tools for your Security Arsenal ☣
- hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
- Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- AutoTTP - Automated Tactics Techniques & Procedures - KitPloit - PenTest Tools for your Security Arsenal ☣
- New certificate in cybersecurity and data privacy law responds to student demand
- 1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018
- How to conduct an ISO 22301-compliant business impact analysis – IT Governance Blog
- New criminal hacking group targets healthcare organisations – IT Governance Blog
- Companies continue to download faulty software exploited in Equifax breach
- GDPR-US-10-things-you-need-to-know-052018_final.pdf
- Securing IoT in Healthcare is Critical | CSO Online
- What is a Chief Security Officer? Understanding this critical role | CSO Online
- Breakout Time: A Critical Key Cyber Metric
- Microsoft's Patch Tuesday Fixes Two CVEs Under ...
- Some ideas about Oracle Database on Docker - Blog dbi services
- Simon Wardley – Strategy by Mapping,Crossing the River by Feeling the Stones — EtherealMind
- Person with diabetes finds open source and builds her own medical device | Opensource.com
- Equifax confirms data breach included driver's licenses and passports
- Security Vendor Sales Pitches and Empty End Point Promises
- Security baseline for Windows 10 “April 2018 Update” (v1803) – FINAL – Microsoft Security Guidance blog
- First things first: Envisioning your security deployment – Microsoft Secure
- The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back?
- What is tar and why does OpenShift Container Application Platform use it? - Red Hat Customer Portal
- Understanding the Role of Multi-Stage Detection in a Layered Defense
- Different block sizes when you plugin? – Upgrade your Database - NOW!
- How to convert/split p12 certificates into single files – – Unixblogger –
- Security Trade-Offs in the New EU Privacy Law — Krebs on Security
- JPCERT/CC Blog: JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
- NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach? – IT Governance Blog
- Software to support your GDPR compliance project – IT Governance Blog
- List of data breaches and cyber attacks in April 2018 – 72,611,721 records leaked – IT Governance Blog
- The GDPR and the right to be forgotten – IT Governance Blog
- The GDPR: Get a crucial cyber security qualification in one day – IT Governance Blog
- Investors must pay closer attention to cyber threats – IT Governance Blog
- Infographic: How to comply with the NIS Directive – IT Governance Blog
- Securing top management’s approval of your BCMS is crucial – IT Governance Blog
- 5 things you need to know about CIR management – IT Governance Blog
- 5 benefits of an ISO 22301-conforming BCMS – IT Governance Blog
- The Scottish Cyber Resilience Strategy for health boards – IT Governance Blog
- Cyber risk and resilience: A guide for the board and senior management – IT Governance Blog
- Cloud service providers and the NIS Directive – are you resilient enough? – IT Governance Blog
- (31) APPSEC Cali 2018 - ReproNow - Save time Reproducing and Triaging Security Bugs - YouTube
- Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception | Ars Technica
- (31) Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac - YouTube
- Is Article 27 the GDPR's 'hidden obligation'?
- Massachusetts Senate passes data breach bill regulating consumer reporting agencies
- Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report - Infosecurity Magazine
- What's the future hold for US health care privacy regulation?
- Equifax has spent $242.7 million on its data breach so far | ZDNet
- Companies launch open-source GDPR framework for DSARs
- Recent Ransomware Incidents Serve Up Lessons - HealthcareInfoSecurity
- FDA Unveils Plan for ‘Software as a Medical Device’ Review
- The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy
- (31) APPSEC Cali 2018 - Closing Keynote - Digital Disease: How Healthcare Cybersecurity Challenges... - YouTube
- Infosecurity.US - Web Log - QOTD Esther Dyson
- GDPR Is Coming. Is Your Organization Ready?
- PyRoMine Malware Sets Security Industry on Fire
- 5 Top Cybersecurity Themes at RSA 2018 - HealthcareInfoSecurity
- How Triton Malware Targets Industrial Control Systems
- Is Payments Industry Ready for New Encryption Protocols?
- SamSam Ransomware Offers Volume Decryption Discount
- Certain Becton Dickinson Products at Risk for 'KRACK' Flaw
- How Authentication Must Evolve in the Age of GDPR
- Former Physician Convicted of Criminal HIPAA Violation
- The Biggest “Small” Personal Digital Security Mistakes – tisiphone.net
- Texas Hospital CEOs: Cybersecurity Is No. 1 Worry
- Multitouch 'skin' makes your body the controller
- Lesley on Brakeing Down Incident Response Podcast – All About Playbooks – tisiphone.net
- Finally, a free open-source database for all Canadian startup information | Financial Post
- USB Device Tracking using the Partition/Diagnostic Event Log - Digital Forensics Stream
- Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. - The Ethical Hacker Network
- Why Am I Getting All These Terms of Service Update Emails? | Electronic Frontier Foundation
- Bring in the Nerds: EFF Introduces Actual Encryption Experts to U.S. Senate Staff | Electronic Frontier Foundation
- Building a freedom-based photography community | Opensource.com
- Spicy Garlicky Stir Fried Eggplant Recipe -- Paleo, Vegan, and Easy | Penniless Parenting
- There is No Middle Ground on Encryption | Electronic Frontier Foundation
- WEBCAST: Web App Assessments for Non-Majors - Black Hills Information Security
- Analyzing Large Capture Files Part 1 – Colorizing Conversations in Wireshark – Chris Sanders
- 'Zero Login:' The Rise of Invisible Identity
- Sarah Squire
- 3 Ways to Maximize Security and Minimize Business ...
- GDPR Requirements Prompt New Approach to Protecting ...
- Ransomware Attacks Jumped 400% Worldwide in 2017
- Automation Exacerbates Cybersecurity Skills Gap
- What Meltdown and Spectre Mean for Mobile Device ...
- Encryption is Necessary, Tools and Tips Make It Easier
- Spectre Returns with 8 New Variants
- 5 Ways to Better Use Data in Security
- Calling all open source advocates: join the GPL Cooperation Commitment
- Going through the 7 stages of GDPR | CSO Online
- Best security software, 2018: How 9 cutting-edge tools tackle threats | CSO Online
- GDPR-defined personal data can be hard to find—here's where to look | CSO Online
- China increases employee surveillance, creating its own Thought Police | CSO Online
- Branding infosec: Why security should consider its own internal advertising campaign | CSO Online
- Can Shadow IT Be Good for Enterprises? | CSO Online
- Updates to Ansible Playbook for Usenet Docker containers | Calvin Bui
- Cybersecurity Tech Accord
- Cyberwar: Silicon Valley’s new bright, shiny thing | CSO Online
- Why securing containers and microservices is a challenge | CSO Online
- Conway's Law: does your organization’s structure make software security even harder? | CSO Online
- What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | CSO Online
- Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds | CSO Online
- Insuring Uncle Sam’s cyber risk | CSO Online
- Starting and Stopping Azure Virtual Machines Using Azure PowerShell
- vCenter Service Appliance 6.7 Tips and Tricks | Virten.net
- Berkshire Hathaway Shareholder Meeting Full Videos, Transcripts, and Podcasts — My Money Blog
- About updating inbox PowerShell modules | >_
- Spectre-NG: Security bods uncover eight new 'Spectre-class' flaws in Intel CPUs
- Yale Scientists Found 'Time Crystal' In The Unlikeliest Place
- US elevates the role of Cyber Command
- Chinese spies linked to decade-long hacking campaign
- Solved: DNS Forwarding 100K+ Entries - Ubiquiti Networks Community
- Should a SaaS provider open source its primary platform? | Opensource.com
- NHS will upgrade all systems to Windows 10 following WannaCry outbreak
- Rob Shaw, Deputy Chief Executive
- Welcome to brigade’s documentation! — brigade 0.0.1 documentation
- Dell Technologies World 2018 – storage.12 – XtremIO X2: An Architectural Deep Dive Notes | penguinpunk.net
- StarEast, InteropITX and GDPR - DBA Kevlar
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 2 - Blog dbi services
- SQL Server Security: Are your databases ready for the GDPR? - Blog dbi services
- On the Myth of the 10X Engineer and the Reality of the Distinguished Engineer – Charting Stacks
- Cloud Not Just Someone Else's Computer · Lindsay Hill
- Testing VSAN 6.7 network outages on Ravello is easy! – vMusketeers
- To Be a 10x Engineer, or Not to Be - IOD: [tech.content]
- 10X Engineers - Quora
- Dell Technologies World 2018 – Dell EMC Announces PowerMax | penguinpunk.net
- What’s The Buzz About StorageOS? | penguinpunk.net
- We Have to Learn How to Manage the Cattle « ipSpace.net by @ioshints
- Qucs project: Quite Universal Circuit Simulator
- Introducing zchunk
- Working around Intel Hardware Flaws | Linux Journal
- This Russian Company Sells Zero-Day Exploits for Hospital Software - Motherboard
- De-Googling my phone · Martin Pitt
- A brief history of bad passwords | Opensource.com
- Open Source Password Management Solutions | Bitwarden
- GitHub - google/gvisor: Container Runtime Sandbox
- May 2018 Issue: Privacy | Linux Journal
- Privacy Is Still Personal | Linux Journal
- Weekend Reading: Qubes | Linux Journal
- The GDPR Takes Open Source to the Next Level | Linux Journal
- Where is serverless computing headed? | Opensource.com
- What is Windows 10 Timeline? How To Use It Like A Pro?
- POWERCFG: How To Check Battery Health Report And Energy Report In Windows Using CMD
- How to Install and Configure Redis on Ubuntu 18.04 and Speed Up WordPress Using Redis Caching | Dotlayer
- A Bash Script to Create a Bootable USB from ISO in Linux
- How to Install BookStack Documentation Wiki on CentOS 7
- Is it Time to Regulate Cyber Conflicts? - Lawfare
- What works best Clean Install or Dirty Upgrade?: VMware ESXi Upgrade on HP ML350e Gen8 – Michelle Laverick…
- DELL N4032 / HP HP ProCurve Switch 2810 / Juniper SRX 300 cheat sheet – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
- Qemu now supports the HPPA in softmmu mode! | Virtually Fun
- What's New in vSphere 6.7? Should I Upgrade?
- Managed Services Market Trends to be Aware of in 2018
- How to Create a Business Project When It's Your College Homework
- VCSA 6.5 AD Lookup Issues #DNS #DIG #VMware #vExpert #VCSA #vCenter – vMusketeers
- vSphere 6.7 – Let’s break it down! - VirtuallyInclined.com
- Sysadmin Stories: PowerCLI - Batch migrate VM network adapter
- Incremental vs Differential Backup: Difference Explained
- Technology Short Take 98 - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- 3 questions about Kata Containers answered | Opensource.com
- Automating Labs…Now With YAML and Multi-Threading! – neckercube.com
- CCNA Training » GRE Tunnel Tutorial
- Things to do after installing Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
- Overview on Android x86 Project & Call to Help – FOSS Post
- A look at Peek screen recorder for GNU/Linux - gHacks Tech News
- Timeshift review - Let's do the time warp again
- Red Hat Launches All-In-One Data Center Storage Solution
- Weekend Reading: Privacy | Linux Journal
- Researchers Spent 10 Years Creating This "Master Key" To Unlock Millions Of Hotel Rooms
- How to randomize DNS resolver selection in Knot Resolver – Ctrl blog
- Zero D’Eh: Canada Takes a Bold Step Towards Offensive Cyber Operations - Lawfare
- The best and worst laptop brands 2018
- StorageNewsletter » Daily Breaking News for the Worldwide IT Storage Industry
- New IRS Data Shows Most IRA Contributions Were Made by Middle-Class Taxpayers - Tax Foundation
- Social media has a censorship problem of its own making
- The perfect is the enemy of the good ~ Get Rich Slowly
- OpenDedup – Opensource Dedupe to Cloud and Local Storage
- Zenko - Scality’s Open Source Multi-Cloud Data Controller
- Non-Malware Attacks: What They Are and How to Protect Against Them?
- Why Hackers Love Healthcare
- Recent BA Ransomware Incidents Serve Up Lessons
- TECH-T08-It's-Time-to-Kill-the-Pentest.pdf
- 5 signs you've been hit with an advanced persistent threat (APT) | CSO Online
- Atlanta's recovery highlights the costly mistake of being unprepared | CSO Online
- Why does your most important database run on Oracle 10.2.0.4?
- Oracle Fusion Middleware Infrastructure 12.2.1.2.0 - Probable Incorrect Firewall Configuration - Blog dbi services
- If You're Not Doing Continuous Asset Management You're Not Doing Security
- NBlog - the NoticeBored blog: NBlog April 24 - privacy policies under GDPR [UPDATED]
- One month out: Top 6 steps for GDPR compliance
- 9 steps to implementing ISO 27001 – IT Governance Blog
- Risk Analysis Requirement Survives ‘Meaningful Use’ Revamp
- GDPR compliance in a nutshell | CSO Online
- All About Versions – Time to Upgrade? | ThatJeffSmith
- How This Artist Finds Abstract Art in Footage of Nuclear Explosions - Motherboard
- How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website | Sitety
- How to Install Log.io Realtime Log Monitoring Tool on Ubuntu 16.04 LTS
- [Howto] Using Ansible to manage RHEL 5 systems – /home/liquidat
- Health care data breaches included in Arizona's new notification law
- MalPipe - Malware/IOC Ingestion And Processing Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- TR Center - Man in the Arena
- A closer look at the GDPR’s technical requirements – IT Governance Blog
- Reading The F****** Manual: Setting Up VMware PowerCLI 10.x – Michelle Laverick…
- A simple Pivotal Container Service (PKS) deployment - CormacHogan.com
- Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security — Cilium
- BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
- Chris's Wiki :: blog/linux/HiDPILinuxHassles
- Cookiescanner - Tool For Check The Cookie Flag In Multiple Sites - KitPloit - PenTest Tools for your Security Arsenal ☣
- 5 steps to an effective ISO 27001 risk assessment – IT Governance Blog
- A catastrophic cyber attack is imminent, says UK government – IT Governance Blog
- Why you shouldn’t ignore the NIS Directive – IT Governance Blog
- Passing the AWS Certified Solutions Architect – Associate Exam 2018 Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert – vMusketeers
- Patching my databases with the April 2018 PSU, BP and RU
- Insider Threat: Putting Theory Into Practice - HealthcareInfoSecurity
- Why is the kernel community replacing iptables with BPF? — Cilium
- Spectre and Meltdown's Critical Impact on Cloud Providers and Customers
- Quick Take-Aways From the RSA Security Conference | CSO Online
- Total Meltdown (not Meltdown!) exploit now available @ AskWoody
- Windows Privilege Escalation - Unquoted Services - The Ethical Hacker Network
- Just solve the problem! ~ Get Rich Slowly
- www.moosecon.com
- Infrastructure Hardening · Veeam Backup & Replication Best Practices
- Tom Sneddon's stuff
- Batch Script Tutorial
- Android-x86 - Porting Android to x86
- GitHub - joaomatosf/jexboss: JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
- DosTips - The DOS Batch Guide
- Francis Lam's Weapons-Grade Ratatouille | The Splendid Table
- GDPR kills the American internet: Long live the internet!
- VMware Product Interoperability Matrices for VMware vSphere Hypervisor (ESXi) | TinkerTry IT @ Home
- Making Use Of The search Option In resolv.conf
- Aaron Toponce : Use A Good Password Generator
- The Difference Between URLs and URIs
- Giving social networking back to you - The Mastodon Project
- Unable to login because of a ESXi root account lockout - IVOBEERENS.nl
- What to know about Spectre and Meltdown with VMware environments - IVOBEERENS.nl
- Conversation Intelligence Technology for Sales Teams | Gong.io
- GitHub - BloodHoundAD/BloodHound: Six Degrees of Domain Admin
- Scanning and Patch Auditing VMware Using Nessus - Blog | Tenable™
- Security Orchestration and Automation for Security Operations | Rapid7
- GitHub - nccgroup/Scout2: Security auditing tool for AWS environments
- Open Source Management and Monitoring System for Ceph | openATTIC
- Index of /
- Including OWASP ModSecurity Core Rule Set – Welcome to netnea
- The Working Centre
- Introducing Mastermind: Powerful and Simple Deployment, Scaling, Load Balancing and Testing of Applications in the Cloud – Microsoft Faculty Connection
- OH2BNF's Plan for a Large Scale Raspberry SDR (LSR-SDR) Based on RTL-SDR Dongles - rtl-sdr.com
- Life On Contract: Lowering Your Cost without Dropping Your Price | Hackaday
- 5 Things You Have to Know About the Dangers of Ransomware
- The 3 Best Ways to Scan Your Old Photos (And Why You Should)
- Learn About Cybersecurity with These 11 Essential Videos
- 7 Types of Ransomware That Will Take You by Surprise
- When Hackerspace Directors Burn Out | Hackaday
- GDPR Data Discovery On Tap from Raz-Lee - IT Jungle
- A lesson in wireless engineering from the Raspberry Pi
- Security Patches: Move Faster to Keep Up With the Bad Guys - Security Boulevard
- 2018 Phishing Trends & Intelligence Report: The Shift to Enterprise - Security Boulevard
- 20 Critical Security Controls: Control 7 – Email and Web Browser Protections - Security Boulevard
- What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders | CSO Online
- Using Rubber Ducky To Steal Encrypted Data | CQURE Academy
- Ransomware (with Allan Liska & Tim Gallo) - Advanced Persistent Security
- NSA reveals how it beats 0-days – Naked Security
- 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs - Security Boulevard
- OWASP APPSEC Cali 2018, Anthony Trummer's 'European Vacation: Leveraging GDPR For Security' - Security Boulevard
- Technology for GDPR Compliance: Turning Plans into Action - Security Boulevard
- Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers - Security Boulevard
- What Harm Can Come From Missing 59,000 Vulnerabilities?
- Doing OSINT and Twitter Analytics with Tinfoleak - Koen Van Impe - vanimpe.eu
- SMBrute - SMB Protocol Bruteforce - KitPloit - PenTest Tools for your Security Arsenal ☣
- RTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR-compliant personal data breach notification procedure – IT Governance Blog
- Keep your professional services firm’s papers under wraps for GDPR compliance – IT Governance Blog
- MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS – IT Governance Blog
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- CYMSAB
- Countdown to GDPR: Part 2 — Opportunities and challenges
- How To Start Taking Control Of Your Data - Essential Privacy Tools
- A brief guide to cyber security risk assessments – IT Governance Blog
- GRC Evolves Into Integrated Risk Management - HealthcareInfoSecurity
- Abbott Issues Software Patches for More Cardiac Devices
- What Came First: VLANs or VRFs? « ipSpace.net by @ioshints
- Chris's Wiki :: blog/solaris/ZFSWhyIOInRecordsize
- UUID of hard disk | SvennD
- Installing and Configuring Windows Server Update Services with Windows Server 2016 Core – Stick To The Script
- Self-hosted videos with HLS | Vincent Bernat
- GDPR Scope Queries for Oracle E-Business Suite | Integrigy
- How to recycle your used and unwanted gadgets
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- This Japanese Budgeting System Could Be the Key to Saving Big Bucks
- kakeibo
- How to be happy and lead a meaningful life ~ Get Rich Slowly
- How will the GDPR impact open source communities? | Opensource.com
- Backup And Restore Application Settings On Newly Installed Linux System - OSTechNix
- Failure to automate: 3 ways it costs you | The Enterprisers Project
- Richard Stallman, RMS, on Privacy, Data, and Free Software
- Privacy as an Afterthought: ICANN's Response to the GDPR | Electronic Frontier Foundation
- Create Dynamic Wallpaper with a Bash Script | Linux Journal
- Life After WannaCry's Wake-Up Call: What's Next?
- Health Data Breach Tally Spikes in Recent Weeks
- The Agony and the Ecstasy of Cloud Billing | Linux Journal
- Running Jenkins builds in containers | Opensource.com
- The IoT Hacker's Toolkit · System Overlord
- How to build confidence (and destroy fear)
- Firewall Management Software | Network Security Monitoring
- Application Risk Module - Kenna Security
- Zero Trust Security Model | Alexander's Blog
- GDPR and client-side tools
- Tips and Tricks for Detecting Insider Threats
- Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
- Healthcare Exchange Standards: IHE Perspective on EU GDPR
- PowerShell Script to Monitor Active Directory Health | Alexander's Blog
- Mesos and Marathon REST API via cURL - A Hello World Example
- Testing the Hetzner Cloud API via cURL - IaaS Automation -
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- IT Automation Part III: Saltstack "Hello World" Example -
- IT Automation Part II: Ansible "Hello World" for Templating -
- IT Automation Part I: Ansible "Hello World" Example using Ansible on Docker -
- GitHub - ubeeri/Invoke-UserSimulator: Simulates common user behaviour on local and remote Windows hosts.
- Finding purpose: 12 exercises to help you discover purpose and passion
- ICND1 & ICND2 » ICND1 – VLAN Questions
- ICND1 & ICND2 » ICND2 – OSPF Questions 4
- ICND1 & ICND2 » ICND2 – OSPF Questions 3
- ICND1 & ICND2 » ICND2 – OSPF Questions 2
- ICND1 & ICND2 » ICND2 – OSPF Questions
- Cisco and System Security Basics: Learning By Doing: Challenges
- ICND1 & ICND2 » ICND2 – InterVLAN Questions
- ICND1 & ICND2 » ICND2 – RSTP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions
- Cisco and System Security Basics: CDP: Building Topology Diagram
- Cisco and System Security Basics: Cheap Hacker's Lab
- Cisco and System Security Basics: Passive Reconnaissance - Flowers in Corp Web Page
- Order of Precedence when Configuring ASP.NET Core – Premier Developer
- Cisco and System Security Basics: Cisco: Beginner Level
- Cyber Defense | PowerShell Script to Block Cortana for Privacy | SANS Institute
- Weekly Cyber Risk Roundup: Orbitz Breach, Facebook Privacy Fallout - Security Boulevard
- 6 practices for super smooth Ansible experience by Maxim Chernyak
- Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
- The Anatomy of an Instant Clone - VMware Blogs
- Getting Started With Vagrant
- Configuration - VirtualBox Provider - Vagrant by HashiCorp
- Migration and Disaster Recovery in the Oracle Cloud with Rackware | Oracle Cloud Infrastructure Blog
- How to Disable, Uninstall or Reinstall OneDrive in Windows 10
- Tap Drill Sizes
- Protecting routers and other network equipment
- GDPR 'Murica! - DBA Kevlar
- Linux 101 for SQL Server DBAs, Part II - DBA Kevlar
- SQL Server Operations Studio - DBA Kevlar
- GDPR Solutions in the Day of Automation - DBA Kevlar
- Hadoop Architecture | HDFS Architecture | HDFS Tutorial | Hadoop Tutorial – DBA Tutorials
- ISO/IEC 27001 and Why It Matters for Your Business
- When Your Greatest Cybersecurity Doubters Are in the C-Suite - Security Boulevard
- 20 Critical Security Controls: Control 10 - Data Recovery Capabilities
- A week in security (April 02 – April 08) - Security Boulevard
- The Future of GPOs - JumpCloud
- MY TAKE: A breakdown of why Spectre, Meltdown signal a coming wave of ‘microcode’ attacks - Security Boulevard
- What do you wish osquery could do? - Security Boulevard
- OPM provides guidance to address cybersecurity skills gap - Security Boulevard
- Netsparker Surveys US Based C-Levels on GDPR Compliance - Security Boulevard
- Efficiently Testing Pipelined Microservices - Security Boulevard
- Infrastructure-as-Code: Project Update - Virtual Elephant
- Oracle Instance – Prakash Blog
- GROW THAT DBA CAREER – Prakash Blog
- Infrastructure-as-Code: Project Overview - Virtual Elephant
- Infrastructure-as-Code: Bootstrap CoreOS with Ignition - Virtual Elephant
- Infrastructure-as-Code: Understanding CoreOS Ignition - Virtual Elephant
- Infrastructure-as-Code: Getting started with Ansible - Virtual Elephant
- Infrastructure-as-Code: Ansible for VMware NSX - Virtual Elephant
- VCDX Quick Hit - Monitoring and Alerting - Virtual Elephant
- Docker for Ansible + VMware NSX Automation - Virtual Elephant
- Enhanced NSX Modules for Ansible - Virtual Elephant
- oVirt hosted engine with zfs storage - My Wired House
- Manage SCCM configuration items and baselines with community tools – 4sysops
- Tailing the Alert Log with SQLcl | ThatJeffSmith
- A Place to Learn Oracle, No Setup Required | ThatJeffSmith
- UK GCHQ director confirmed major cyberattack on Islamic StateSecurity Affairs
- JeremyFleming
- “Need to Know” for Oracle DBA Begineers – Prakash Blog
- The DBA works at the intersection of the database, server, operations group, and developers. A DBA must understand concepts from all these facets of IT as well as be able to draw upon knowledge of their production environment to troubleshoot performance, hardware, and software issues.
- RAC Notes Scanned Documents – Prakash Blog
- Database Authentication with a Smart Card – Part 3 | Late Night Oracle Blog
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 1 - Blog dbi services
- Oracle Backup and Recovery Solutions – Prakash Blog
- SOLVED: Application Data.. repeating recursion | Wordlinks' Blog
- Disable or Uninstall OneDrive Completely in Windows 10 - Tech Journey
- 20 Ways to Increase the Efficiency of the Incident ...
- As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million - Security Boulevard
- Tenable Research Advisory: AXIS Camera App Malicious Package Distribution Weakness - Blog | Tenable™
- Zuckerberg Unveils the Cyber-Naivete of Congress - Security Boulevard
- Best Buy the Latest Victim of Third-Party Security ...
- A Nonverbal Analysis of Mark Zuckerberg’s Congress Testimony - Social-Engineer.Com - Professional Social Engineering Training and Services
- Are your Android devices updated? Researchers say maybe noSecurity Affairs
- Security Affairs newsletter Round 157 – News of the weekSecurity Affairs
- The Real Industry Behind Fake Electronics - Motherboard
- Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flawSecurity Affairs
- Pairing Policy & Technology: BYOD That Works for ...
- Slideshows - Dark Reading
- Avoiding the Ransomware Mistakes that Crippled ...
- 7 Steps to a Smooth, Secure Cloud Transition
- 7 Non-Financial Data Types to Secure
- Businesses Calculate Cost of GDPR as Deadline Looms
- Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith's Consulting Blog
- Basic Usage - Provisioning - Vagrant by HashiCorp
- GitHub - Or3stis/apparatus: A graphical security analysis tool for IoT networks
- ASTo - An IoT Network Security Analysis Tool and Visualizer - KitPloit - PenTest Tools for your Security Arsenal ☣
- APNIC Labs enters into a Research Agreement with Cloudflare | blabs.apnic.net
- The Art of Soldering - Motherboard
- Atlanta, Colorado DOT ransomware mitigation costing millions
- Journey Into Incident Response: Process Hollowing Meets Cuckoo Sandbox
- Journey Into Incident Response: Making Incident Response a Security Program Enabler
- Journey Into Incident Response: Introducing the Active Threat Search
- Journey Into Incident Response: Security Monitoring with Attack Behavior Based Signatures
- Journey Into Incident Response: Triage Practical Solution – Malware Event – Proxy Logs Prefetch $MFT IDS
- GitHub - infobyte/faraday: Collaborative Penetration Test and Vulnerability Management Platform
- How GDPR could impact US health care providers
- Security baselines should underpin efforts to manage cybersecurity risk across sectors – Microsoft Secure
- Building a Successful Security Operations Center (SOC): Part 4Rafeeq Rehman – Personal Blog
- Vulnerability Assessment | Detect Vulnerabilities in Binaries via Hash Lookup
- Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference – Microsoft Secure
- Why the cyber security skills gap is so damaging – IT Governance Blog
- How are the C-Suite failing cyber security? – IT Governance Blog
- 10 key areas to identify gaps in your GDPR compliance – IT Governance Blog
- Why ISO 27001 is integral to data protection compliance – IT Governance Blog
- The GDPR: What technical measures do you need to conduct? – IT Governance Blog
- Healthcare Exchange Standards: IHE on FHIR tutorial
- Healthcare Exchange Standards: De-Duplicating the received duplicate data
- 2018 Data Breach Investigations Report | Verizon Enterprise Solutions
- 2018-02.pdf
- GitHub - XalfiE/Nix-Auditor: Nix Audit made easier (RHEL, CentOS)
- The Impact of All 50 States Having Breach Notification Laws
- Trusted insider at the federal level raises concerns | CSO Online
- Imran Awan
- Facebook's Zuckerberg Pledges Worldwide GDPR Compliance
- Sep 2011 - C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit.pdf
- WSUS Automated Maintenance (Formerly Adamj Clean-WSUS) - Script Center - Spiceworks
- The CISO as an Internal Security Evangelist - HealthcareInfoSecurity
- How to setup SOC using open-source tools – Sath
- Healthcare Data Management | Commvault
- VMware Storage IO Control (SIOC) Overview
- Open Security Operations Center
- On Old Configs and Automation | The Networking Nerd
- Mind Map for CCIE & CCNP Routing & Switching – neckercube.com
- Mellanox, Ixia and Cumulus: Part 3 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 2 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 1 - MovingPackets.net
- Container Security through Segregation « ipSpace.net by @ioshints
- The Death Of Expertise
- Security baseline for Windows 10 (v1511, "Threshold 2") — FINAL – Microsoft Security Guidance blog
- Article: Using Secedit To Apply Security Templates | ITNinja
- Infront Consulting Group - Microsoft IT solutions and software
- Business Intelligence and Big Data Analytics Softwa
- high performance WAF platform with Naxsi and HAProxy - HAProxy Technologies
- Configuring Apache in front of JBoss Application Server Using mod_jk
- The answers to your questions for Eben Upton - Raspberry Pi
- Explaining and Demonstrating Jam and Replay Attacks on Keyless Entry Systems with RTL-SDR, RPiTX and a Yardstick One - rtl-sdr.com
- How to clean a circuit board - The Silicon Underground
- Kubernetes 1.10 Released - via @codeship | via @codeship
- Looking inside a .NET core process using windbg – Rohith's blog
- Compare two text files with PowerShell – neo
- Ramping up on Powershell & CLI – Premier Developer
- The Japanese Calendar’s Y2K Moment – I'm not a Klingon ( )
- Cooking for Beginners: 5 Essential Sites for Newbies in the Kitchen
- DSHR's Blog: Natural Redundancy
- The Raspberry Pi 3B+ As An SDR – Without The SDR! | Hackaday
- A comprehensive guide to Docker Networking – Marksei
- The Bootup Baseline (by Tony Fortunato)
- Deployment Research > Research
- Lawmakers want more tech companies to address privacy legislation
- Katello: Create a Domain, Subnet, Installation Media, OS, Provisioning Templates, Host Groups, PXE Boot | Lisenet.com :: Linux | Security | Networking
- 50 State Infographic: How Much Income Do You Need to Afford the Average Home? — My Money Blog
- Automating 4,000 Microsoft SQL Databases with Rubrik, REST APIs, and PowerShell – Virtually Sober
- AWS Online Tech Talks – April & Early May 2018 | AWS News Blog
- How to create vSphere VMs with RDM disks
- Tackling L33t-Speak | Linux Journal
- Agedu - A Useful Tool for Tracking Down Wasted Disk Space in Linux
- Simple Cloud Hardening | Linux Journal
- Blockchain, Part I: Introduction and Cryptocurrency | Linux Journal
- Weekend Reading: Sysadmin 101 | Linux Journal
- 20 Outstanding Backup Utilities for Linux Systems in 2018
- How Wizards and Muggles Break Free from the Matrix | Linux Journal
- Install an OpenStack cloud with Jenkins | Opensource.com
- Laverna - keep your notes private
- Capsule8 - Zero-day attack detection for modern Linux environments
- How to Boot Debian 9 ISO File Directly From Hard Drive With GRUB2
- 42 Books That Will Make You A Better Person (Each Described In 1 Sentence) | RyanHoliday.net
- A Google Cloud Platform Primer with Security Fundamentals
- 6 Steps for GDPR Readiness
- 20 Critical Security Controls: Control 16 - Account Monitoring and Control
- What is Virtual Hardening for Websites? Read all about it.
- 20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program - Security Boulevard
- Improved Cybersecurity Measures for Better Organizations | Netswitch Technology ManagementNetswitch Technology Management
- Web Application Firewalls: The Definitive Primer - Security Boulevard
- 10 Best Practices for Mobile App Penetration Testing
- 20 Critical Security Controls: Control 15 - Wireless Access Control
- Establishing a Global Security Operations Center (GSOC) - Security Boulevard
- GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams - Security Boulevard
- Why Enterprises Should Control Their Encryption Keys - Security Boulevard
- It’s Complicated - Operational Security for Developers - Security Boulevard
- Burp Suite continuing the Saga - Security Boulevard
- SamSam Ransomware: How to Identify and Mitigate the Risk - Security Boulevard
- Real-Time Analytics for PCI Compliance - Security Boulevard
- Annual Report Shows Increased Maturity in Security Operations - Security Boulevard
- SAP HANA Pentesting. Part 1: Vulnerabilities history
- SecurityEverAfter 2018-03-29 21:17:00 - Security Boulevard
- 3 Payloads in Healthcare Data Breaches - Security Boulevard
- 20 Critical Security Controls: Control 12 - Boundary Defense
- OWASP APPSEC Cali 2018, Josh Sokol's 'Architecting for Security in the Cloud' - Security Boulevard
- Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk - Security Boulevard
- RAVELLO: Troubleshooting VSAN Network connectivity issues – vMusketeers
- VMware Specialist: vSAN – Objective 2.2 – Describe vSAN Requirements - thecloudxpert
- Nexenta Announces NexentaCloud | penguinpunk.net
- DBeaver is an SQL client and a database administration tool - Free Alternative to SQL Server Management Studio | ESX Virtualization
- White-Label Backup Solution as a part of MSP Offering
- Amazon S3 Storage Classes Explained
- Managed Service Provider Pricing: Basic Guide on MSP Pricing Models
- Best Backup Software in 2018 | G2 Crowd
- What is SAP S/4HANA? – Business Introduction
- SAP S/4HANA
- The Many Hats Club: Color Doesn't Matter
- 20 Critical Security Controls: Control 11 - Secure Configuration for Network Devices
- Physician, protect thyself: An ounce of prevention is worth a pound of cure - Security Boulevard
- Nine Selves and the Hero’s Journey – Michael O. Church
- How to improve your code using SonarQube
- DSHR's Blog: Flash vs. Disk (Again)
- Tofugu — A Japanese Culture & Language Blog
- How Long Does It Take To Recover From vSAN Drive or Node Failures? — ThinkCharles.net
- Metrics, Measurement, and Information Security -
- SamSam Ransomware: How to Identify and Mitigate the Risk - Blog | Tenable™
- How to prepare for a security audit | Trail of Bits Blog
- GRUB Recovery for UEFI/GPT/LUKS/LVM · The Hacking Memento
- GoScanSSH Malware spread avoiding Government and Military networksSecurity Affairs
- IPFS is the Distributed Web
- Securing the Corporate WLAN in a Healthcare Regulated Organization - securing-corporate-wlan-healthcare-regulated-organization-38370
- Top 6 steps for GDPR compliance
- InfoSec Handlers Diary Blog - How are Your Vulnerabilities?
- NBlog - the NoticeBored blog: NBlog April 4 - 7 top tips on documentation
- Announcing: new British Standard for cyber risk and resilience – Microsoft Secure
- MalwareJake: Atlanta government was compromised in April 2017 - well before last week's ransomware attack
- 7 common flaws that keep security managers up at night
- 7 points CEOs need to know about Spectre and Meltdown
- Envizon - Network Visualization Tool With Focus On Red / Blue Team Requirements - KitPloit - PenTest Tools for your Security Arsenal ☣
- Pyfiscan - Web-Application Vulnerability And Version Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Moloch - An Open Source, Large Scale, Full Packet Capturing, Indexing, And Database System - KitPloit - PenTest Tools for your Security Arsenal ☣
- GRR Rapid Response - Remote Live Forensics For Incident Response - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security Onion - Linux Distro For IDS, NSM, And Log Management - KitPloit - PenTest Tools for your Security Arsenal ☣
- The GDPR: A guide for small businesses – IT Governance Blog
- 15% of computers still run on Windows XP at NHS Lothian in Scotland – IT Governance Blog
- Employees’ lack of security awareness is “inexplicable and inexcusable” – IT Governance Blog
- Simplify your risk assessments – IT Governance Blog
- How to write an ISO 22301-compliant business continuity plan – with example template – IT Governance Blog
- Data Security and Protection (DSP) Toolkit launched for health and social care – IT Governance Blog
- GDPR compliance for professional services firms: time to get on track – IT Governance Blog
- 7 principles of the PRINCE2 project management method – IT Governance Blog
- ISO 27001: How to set and document your information security objectives – IT Governance Blog
- Why you should know about SSL certificates: CertDB.com Case
- 10 Alarming Cyber Security Facts that Threaten Your Data [Updated]
- 10+ Critical Corporate Cyber Security Risks – A Data Driven List [Update 2018]
- Why Is Shadow IT So Common in Healthcare? - HealthcareInfoSecurity
- Should HHS Offer Incentives for Cybersecurity Frameworks?
- Full Disk Encryption on Linux – Exotic Security
- Using Piwik Analytics – Exotic Security
- What exactly is encrypted with Android full disk encryption?
- Setting up FreeRADIUS to secure your WiFi – Exotic Security
- KeePassX
- Is patching still the best defence – Exotic Security
- Automatic Updates for Debian – Exotic Security
- Setting up Gogs on Debian Jessie with Apache2 and PostgreSQL – Exotic Security
- Ansible Role Rdiff-Backup Script | World Backup Day | b3n.org
- Fill Your Skills Tank - The IT Hollow
- How to Reset the ESXi Root Password
- Docker for impatient newbies part 1: Getting started – The Buttonfactory
- 20 Ways to Get The Most Out of Your Data Platform - Thomas LaRock
- IP Over InfiniBand and KVM Virtual Machines - Patshead.com Blog
- Lecture Your Sudoers - krypted.com
- Out-Default Considered Harmful! | Keith's Consulting Blog
- How to setup PFSense with the new Secure and Private CloudFlare 1.1.1.1 DNS – jasoncoltrin.com
- Errata Security: WannaCry after one year
- How to Set Up AWS CloudTrail: An Important Step in Account Security - Delta Risk
- Slideshows - Dark Reading
- 3 Security Measures That Can Actually Be Measured
- Medical Device Security Startup Launches
- Four Gas Pipeline Firms Hit in Attack on Their EDI ...
- How Security Can Bridge the Chasm with Development
- How to Build a Cybersecurity Incident Response Plan
- Supply Chain Attacks Could Pose Biggest Threat to ...
- The Definition of Security is “Without Worry"
- DevOps as the Art and Science of Deliberate Practice
- Analysis of the 2018 F5 Threat Intel Report
- 11 ways ransomware is evolving | CSO Online
- What is FedRAMP? How cloud providers can work with the U.S. government | CSO Online
- MITRE ATT&CK
- RSA Conference: CISOs' top 4 cybersecurity priorities | CSO Online
- What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
- Integrating Ansible with Jenkins in a CI/CD process
- SQL Server Always Encrypted Data | CQURE Academy
- GDPR: end user data loss prevention | CSO Online
- An excellent demonstration of Cross-Site Request Forgery – Exotic Security
- Alternative Networks for this site - ZeroNet – Exotic Security
- Alternative Networks for this site - Tor – Exotic Security
- Alternative Networks for this site - I2P – Exotic Security
- Kerckhoffs's principle – Exotic Security
- Setting up mailpile on Debian 8 Jessie for remote access – Exotic Security
- Adding subject alternative name to certificate request – Exotic Security
- Riot – Riot – open team collaboration
- Home | Matrix.org
- Seting up Matrix Synapse and Riot on Debian 8 Jessie – Exotic Security
- Using ssh config to save settings and make your life easier – Exotic Security
- Chris's Wiki :: blog/sysadmin/BackupCompressionNumbers
- Storing passwords in cleartext: don't ever
- Newsboat - An RSS/Atom Feed Reader for Linux Terminals
- 12 Git tips for Git's 12th birthday | Opensource.com
- ASD's Essential Eight – Exotic Security
- How I Manage Successful Customer 360 Projects
- Upgrading a Nexus 6P from CyanogenMod 13 to LineageOS 14 – Exotic Security
- Automating Oracle Linux Installation with Kickstart - Blog dbi services
- Working with Windows File and Folder NTFS Permissions (Copy and Reset) – A Windows System Admin's Blog
- Best Free Web Application Firewalls - Add an External Security Layer - LinuxLinks
- IP Addresses in Entertainment | The Networking Nerd
- Akash Network
- Overclock Labs | Distributed Infrastructure, Simplified
- 10 Killer Tips To Speed Up Ubuntu Linux
- How to Install Ansible AWX on CentOS 7
- Is Cybersecurity Improving? - Lawfare
- Is It Legal to Publish Email Correspondence Without Permission? - Law and Daily Life
- Foolish money mistakes (and how to avoid them) ~ Get Rich Slowly
- 2 Simple Principles to Make Your Business Relationships More Profitable
- GitHub - gerbera/gerbera: UPnP Media Server for 2018 (Based on MediaTomb)
- FDA wants Facebook and Twitter to crack down on opioid sales
- 6 myths CEOs believe about security | CSO Online
- SamSam group deletes Atlanta's contact portal after the address goes public | CSO Online
- How to configure multiple websites with Apache web server | Opensource.com
- Jaffar's (Mr RAC) Oracle blog: Backup2Cloud - a backup/restore automation utility
- How reimaging detects the ODA hardware? - Blog dbi services
- 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
- Install SquidGuard with Squid proxy server : Complete guide - LinuxTechLab
- How to Benchmark Your System (CPU, File IO, MySQL) with Sysbench
- FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool | Linux Journal
- Apple now lets you access medical records in Health app
- A simple (but effective) investment strategy ~ Get Rich Slowly
- Dinnertime: Which Meals Offers The Most Nutrition Per Dollar? — My Money Blog
- Epic Fail: Microsoft's Windows 7 Meltdown Fix Made Your PC More Insecure
- How to programmatically set-up a (HTTP) proxy for a Selenium test | Adventures in the programming jungle
- The hidden (and not so hidden) costs of a ransomware attack | CSO Online
- Setting Up Full Disk Encryption on Debian 9 Stretch – Exotic Security
- Installing OpenCanary on a Raspberry Pi – Exotic Security
- Upgrading vSphere 5.5 before End of General Support – The Wifi-Cable
- Benefits of Cloud Storage: Cloud Backup Cost, Data Availability and More
- Happy 25th birthday Red Hat Linux! | ZDNet
- 9 Ways to Vet Your New Employer
- BranchScope: Your Intel CPUs Are Vulnerable To New Spectre-Like Attack
- Manage your workstation with Ansible: Automating configuration | Opensource.com
- How to create an open source stack using EFK | Opensource.com
- Elasticsearch, Fluentd, and Kibana (EFK)
- Get money: Live the life you want, not just the life you can afford
- Attending AWSome Day #AWSomeDay #AWS @AWS_UKI @AWScloud – vMusketeers
- Teaching ‘Cybersecurity Law and Policy’ - Lawfare
- IETF Approves TLS 1.3 as Internet Standard
- Dunning-Kruger in IT Infrastructure « ipSpace.net by @ioshints
- 5 Minute FOSS: Spinning a custom Linux distribution | Linux Journal
- Reuse before buy before build – Exotic Security
- OWASP OWTF
- "WannaCry" ransomware attack losses could reach $4 billion - CBS News
- Setting up Backblaze for Duplicati – Exotic Security
- Hang Gliding Over Hell, 3 drives die in a 6 drive NAS – Exotic Security
- Jaffar's (Mr RAC) Oracle blog: Oracle Cloud - Database Services
- Jaffar's (Mr RAC) Oracle blog: Tricky Oracle data guard situation
- Jaffar's (Mr RAC) Oracle blog: Benefits from Oracle Backup to could service
- IT Value: Using the Web to Divide Your Organizations for Effective Resource Management | CIO
- A Breakdown of Utility Computing | CIO
- Ransomware Damage Costs $5 Billion in 2017, Up from $350 Million in 2015Cybersecurity Ventures
- General Data Protection Regulation
- GitHub - redhat-performance/quads: Automated future scheduling, documentation, end-to-end provisioning and assignment of servers and networks.
- BSI Kitemark | BSI Group
- FY17 NDAA Bill Summary.pdf
- Cybersecurity experts: Device makers have “duty to keep users safe” from hacking | Imperial News | Imperial College London
- BeyondCorp A New Approach to Enterprise Security
- Hippocratic Oath for Connected Medical Devices | i am the cavalry
- Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) - nistir8200-draft.pdf
- Tech Networking in Asheville NC and Western North Carolina
- GitHub - R0GGER/docker-wsusoffline: Using a Docker container for WSUS Offline Update...
- Leader in Third-Party Remote Access | Third-Party Remote Support | SecureLink
- BeyondCorp | Run Zero Trust Security Like Google
- Database Authentication with a Smart Card – Part 1 | Late Night Oracle Blog
- FOSSA - Effortlessly comply with open source licenses
- Linux mkfifo Command Tutorial for Beginners (with Examples)
- ddgr - A Command Line Tool To Search DuckDuckGo From The Terminal | 2daygeek.com
- ddgr
- Digitizing VHS with Fedora | Opensource.com
- 8 Ways to Maintain a Clean, Lean Ubuntu Machine - Make Tech Easier
- Huawei – Probably Not What You Expected | penguinpunk.net
- Atlanta officials still 'working around the clock' to resolve ransomware attack | CSO Online
- Shenzhen's Homegrown Cyborg - Motherboard
- GitHub - cldrn/rainmap-lite: Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
- Windows Server release information | Microsoft Docs
- Windows Client and Server in 2018 – Stick To The Script
- Every Business Needs to Prioritize Security - common denial
- Defining Computer Security Incident Response Teams | US-CERT
- CERTs, CSIRTs and SOCs after 10 years from definitions - Security Boulevard
- 4 Tips for Managing an Employee with Addiction
- My life philosophy: 49 things I've learned during 49 years on Earth
- Teamwork: Embracing new culture of work – The Art of Possible
- Going paperless with Tesseract OCR
- Hackaday Visits World’s Oldest Computer Festival: TCF 43 | Hackaday
- How to download files with Powershell - Thomas Maurer
- TCF
- Tracking ransomware end-to-end | the morning paper
- How to Save on Storage cost and security using AWS - ITSMDaily.com
- Infosecurity.US - Web Log - Our Strategy...
- Technological Unemployment: Yes, It’s Our Problem Too – Michael O. Church
- 8 Easy Ways to set your Desktop up for a Distraction-Free Software Demo
- Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
- Tackling a Fear Of Public Speaking
- Automating DataDog with Terraform
- Windows Metric Dashboards with InfluxDB and Grafana
- 5 Tips for Writing DSC Resources in PowerShell 5
- Ultimate PowerShell Prompt Customization and Git Setup Guide
- Testing Ansible Roles Against Windows with Test-Kitchen
- Slow Transfer, Packet Losses, Congestion Avoidance, Shaping and Policing (by Phil Storey)
- City of Atlanta paralyzed by a ransomware attack, is it SAMSAM?Security Affairs
- What Does the GDPR Consider to be a Data Breach?
- Computer Forensics: Chain of Custody
- SANNY Malware Delivery Method Updated in Recently Observed Attacks - Security Boulevard
- Beware the fake Facebook sirens that flirt you into sextortion – Naked Security
- ODIN - Tool For Automating Penetration Testing Tasks - KitPloit - PenTest Tools for your Security Arsenal ☣
- PyRexecd - Standalone SSH Server For Windows - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cyber attacks: What to prepare for – IT Governance Blog
- How ITIL can help your cyber security career – IT Governance Blog
- How ISO 27001 and ISO 22301 can help keep your organisation secure – IT Governance Blog
- vSAN Benchmarking on Consumer Grade Kit — ThinkCharles.net
- Removing Inaccessible Objects in vSAN — ThinkCharles.net
- A Look At The Relative Spectre/Meltdown Mitigation Costs On Windows vs. Linux - Phoronix
- Setting up a safe development environment in Linux · gsilvapt dot me
- Healthcare Exchange Standards: Privacy is not dead, but does need reinforcement
- 4 Ways Every Employee Can Play a Role in Their Company’s Security
- Hybrid cloud security: Emerging lessons | The Enterprisers Project
- Create VLAN bridge under Linux (trunk, IEEE 802.1Q) | panticz.de
- A system administrator's guide to getting started with Ansible - FAST!
- Is Patching And Tech Support Bad? A Response | The Networking Nerd
- vMotion with 40GbE NIC – virtual graveyard
- The Linux Journal NSA Weekend Reading List: Tails and Tor | Linux Journal
- Doc Searls Weblog · Facebook’s Cambridge Analytica problems are nothing compared to what’s coming for all of online publishing
- France's Cyberdefense Strategic Review and International Law - Lawfare
- United States Cyber Command’s New Vision: What It Entails and Why It Matters - Lawfare
- Dell EMC and VMware – Better Together for Service Providers - VMware Telco NFV Blog - VMware Blogs
- mastodon.social - Mastodon
- VMware ESXi and ESXTOP "P" Key is New in vSphere 6.5 - Did you know? | ESX Virtualization
- Surviving 63 Drives Failure on vSAN — ThinkCharles.net
- NSX-v 6.3 - Load Balancing capabilities + confi... |VMware Communities
- 25 Low-Cost Foods Packed With Nutrition
- Advice for a young adult learning to manage money ~ Get Rich Slowly
- New R2D2 Technique Protects Files Against Wiper Malware
- An accessible overview of Meltdown and Spectre, Part 2 - Security Boulevard
- Cloud Backup for Small Business: 3 Misconceptions SMBs Have About Cloud
- Study: Malware counts higher on computers whose users visited piracy sites
- Government ‘should have done more’ to prepare organisations for the GDPR – IT Governance Blog
- 80% of organisations affected by cyber security skills gap – IT Governance Blog
- On purpose and by necessity: compliance under the GDPR | the morning paper
- Three years of the Right To Be Forgotten | the morning paper
- 10 Vital Features You Should Know About Your Windows PC
- 10 Basic Encryption Terms Everyone Should Know and Understand
- Lack of investment in security training adds to skills gap
- Google Beefs Up Cloud Security and Data Privacy Tools | News & Opinion | PCMag.com
- White House pushing for research carveout in GDPR
- Why is the CISO Role the Most Difficult Job in the World?Webinar.
- Digital Advertising Consent
- Oath Takes Aggressive Steps Outlining GDPR Compliance 03/22/2018
- Is MLAG an Alternative to Stackable Switches? « ipSpace.net by @ioshints
- Suplemon - A Powerful Console Text Editor with Multi Cursor Support
- Practical Security Principles
- The Reason Software Remains Insecure
- The Two Kinds of Privacy Loss
- Mitigating Personal Cyber Risk | CSO Online
- How Programming Affects Your Brain: 3 Big Truths According to Science
- How to Decide If You Need the New Raspberry Pi 3 B+ Model
- Wireshark, an Open-Source Forensic Tool
- Opening RDP sessions from KeePass
- CRISC Domain 2: IT Risk Assessment
- Why it’s a bad idea to break the rules, even if it’s for a good cause - 80,000 Hours
- Use Ansible to patch your system and install applications | Opensource.com
- A Guide to Preventing Common Security Misconfigurations
- CASP Domain 4: Integration of Computing, Communications, and Business Disciplines
- 8 Podcasts About Crypto for Future Bitcoin Millionaires
- Threat Horizon 2020: Foundations Start To Shake - Information Security Forum
- 10 efficient tools every marketing team needs in 2018
- ToolsWatch.org – The Hackers Arsenal Tools Portal » T.rex_scan v0.2 – Integrate Tools to Audit Web Sites
- Critical Security Controls v7 RELEASED - Security Boulevard
- Yoda - The Command line Personal Assistant For Your Linux System - OSTechNix
- WPSeku v0.4 - Wordpress Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cybersecurity Spring Cleaning: 3 Must-Dos for 2018 ...
- Zerto – What it is and why you need it | JonKensy.com
- Case Study: Scaling Your Data Scientist
- Your servers are replicated? Your backups should be, too » NetWorker Information Hub
- SOC in Translation: 4 Common Phrases & Why They ...
- Western Digital – The A Is For Active, The S Is For Scale | penguinpunk.net
- 7 Types of People Who Will Help Grow Your Career
- Evil Tester: Automated Execution for Acceptance Testing - Java JUnit FizzBuzz
- AMD vows to fix newly-disclosed processor vulnerabilities
- Moro - A Command Line Productivity Tool For Tracking Work Hours - OSTechNix
- 7 Spectre/Meltdown Symptoms That Might Be Under ...
- Codev2:Lawrence Lessig
- (My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
- redhat event Ansible Automates Zurich - Blog dbi services
- The Cambridge Analytica-Facebook Debacle: A Legal Primer - Lawfare
- NBlog - the NoticeBored blog: NBlog March 20 - a critique of CIS netsec metrics
- Python BeautifulSoup Tutorial For Beginners | Linux Hint
- Taipan - Web Application Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Lessons the world took from ITIL | The IT Skeptic
- ISO 27001 and the GDPR
- Do IT Pros Consider Security When Purchasing Software? - Security Boulevard
- CIS Releases Revised Top 20 Critical Security Controls
- CUDA is Like Owning a Supercomputer | Hackaday
- A Data Protection Officer's Guide to the GDPR Galaxy
- Insider threat examples: 7 insiders who breached security | CSO Online
- How to Encrypt Files From Within a File Manager | Linux.com | The source for Linux information
- ACUS_Intel_MedicalDevices.pdf
- CSR - ScottErvenMedicalDeviceSecurity.pdf
- Underwriters Labs refuses to share new IoT cybersecurity standard | Ars Technica
- Talks | i am the cavalry
- It's Insanely Easy to Hack Hospital Equipment | WIRED
- SNMP Lab Setup and Penetration Testing
- Errata: Steve Gibson
- Enterprise NAS Data Migration and Replication Solutions | Datadobi
- Vint Cerf and Bob Kahn, co-inventors of TCP/IP protocol | FierceTelecom
- GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- Network issues with Updates KB4088875 / KB4088878 | Born's Tech and Windows World
- Security-announce Info Page
- OIG: HHS Improves Security, Yet Flaws Remain - HealthcareInfoSecurity
- Weekly Cyber Risk Roundup: Russia Sanctions, Mossack Fonseca Shutdown, Equifax Insider Trading - Security Boulevard
- Chris's Wiki :: blog/solaris/ZFSPoolRecoveryComing
- Oracle Ravello Blogger Day 2018 (aka #RBD2) | Michelle Laverick...
- Seth's Blog: When well-meaning people can't see it the same way
- Magical Thinking in Internet Security
- A Tale of Two Phases and Tech Inertia | Hackaday
- What?s It Take To Be Tomorrow?s CISO? - Security Boulevard
- Top 10 articles every SAP BASIS admin must read
- Steps to Become CISSP (Certified Information Systems Security Professional)
- Cybersecurity Evolution and its Importance in the Digital Age - Security Boulevard
- More Free/Open Source Computer Forensics Tools
- Are You Compliant with NIST 800-171? - Security Boulevard
- 9 Cyber Security Tips SMBs Can Implement Now - Delta Risk
- CASP Domain 3: Research and Analysis
- CASP Domain 2: Risk Management and Incident Response
- CASP Domain 1: Enterprise Security
- Harden your JBoss EAP 7.1 Deployments with the Java Security Manager - Red Hat Customer Portal
- Microsoft Security Intelligence Report volume 23 is now available – Microsoft Secure
- Security: 17 Things | Linux Journal
- 3 best practices for securing Kubernetes environments | Opensource.com
- Getting to know your company’s risk appetite | CSO Online
- The CLOUD Act Doesn’t Help Privacy and Human Rights: It Hurts Them - Lawfare
- GitHub - initstring/linkedin2username: OSINT Tool: Generate username lists for companies on LinkedIn
- GitHub - rezasp/joomscan: OWASP Joomla Vulnerability Scanner Project
- SpiderFoot
- 5 reasons why law firms should adopt ISO 27001 – IT Governance Blog
- Failing to patch vulnerabilities now will lead to punishment under the GDPR – IT Governance Blog
- Get involved in Shaping the Future of the Internet (by Nalini Elkins)
- GDPR Violations Are Hiding In Your Database - Here's How To Find Them - Thomas LaRock
- We Need To Talk About Dashboards - Thomas LaRock
- (ISC)2 Report: Glaring Disparity in Diversity for ...
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 2 – Ather Beg’s Useful Thoughts
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 1 – Ather Beg’s Useful Thoughts
- 3 ESXi Backup Methods using the Command-Line
- FAI.me - build you own customized installation image
- Chris's Wiki :: blog/linux/NfsiotopDesire
- How to take back control of /etc/resolv.conf on Linux – Ctrl blog
- MSRC security guidance: the dashboard | >_
- Oracle Patches Spectre for Red Hat | Linux Journal
- Infection Monkey
- How to Overclock Your AMD GPU with AMDGPU on Linux - Make Tech Easier
- Woke to IT Age Discrimination - The IT Hollow
- Terence Luk: Monitoring Microsoft Exchange Server 2010, 2013 and 2016 services with PowerShell script and task scheduler
- Emerging Technologies and VeriSM | Purple Griffon
- The SQL Server Tiger Team Bookmarks - Thomas LaRock
- Intel Spectre/Meltdown Microcode Updates (March 11, 2018) | Born's Tech and Windows World
- MSRC security guidance: about release notes | >_
- Databases need to be patched to a minimum before April 2019
- GRV - A Tool for Viewing Git Repositories in Linux Terminal
- Oracle Linux vs RedHat | Linux Hint
- Cli.Fyi – A Tool To Quickly Retrieve Useful Information | 2daygeek.com
- HIPAA Guidelines & Cloud Service Providers - Security Boulevard
- XKCD, Generations - Security Boulevard
- An Overview of the CCSP Domains
- The Ultimate Guide to CCSP Certification
- Evolving to Security Decision Support: Laying the Foundation - Security Boulevard
- How to Prepare for the Future of Healthcare Digital Security - Security Boulevard
- March Updates on Frameworks & Standards - Security Boulevard
- The Top Five SOC 2 Compliance Questions Answered - Security Boulevard
- What the Next Era of Cloud Computing Means for AppSec & the SDLC - Security Boulevard
- Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program - Security Boulevard
- Army History, No. 106, Winter 2018 - AH106(W).pdf
- 2018 Cyberthreat Defense Report: Where IT Security Is Going - Security Boulevard
- From my Gartner Blog - The Virtual Patch Analyst - Security Boulevard
- Shifting Gears to Cloud-Centric Cybersecurity - Security Boulevard
- What is a vulnerability management program? - The Silicon Underground
- VMRay Analyzer: Rapid Malware Analysis for Incident Response (IR) Teams - vmray-analyzer-rapid-malware-analysis-incident-response-ir-teams-38325
- Learn More about the 2018 PMP Exam Change | Tech Roots
- Measure Security Performance, Not Policy Compliance - Security Boulevard
- Who Cares About Cybersecurity? - Lawfare
- Comparing Plans | Oracle Scratchpad
- How To Quickly Monitor Multiple Hosts In Linux - OSTechNix
- HIMSS18: Cybersecurity Takeaways - HealthcareInfoSecurity
- GitHub - facebook/zstd: Zstandard - Fast real-time compression algorithm
- UTOUG Training Days 2018 in Salt Lake City
- NextGen SIEM Isn’t SIEM - Security Boulevard
- NBlog - the NoticeBored blog: NBlog March 8 - brainstorming awareness ideas
- What’s new for the Command Line in Windows 10 version 1803 – Windows Command Line Tools For Developers
- CredsLeaker - Tool to Display A Powershell Credentials Box - KitPloit - PenTest Tools for your Security Arsenal ☣
- Ride The Lightning: Large Law Firms Seeing More Data Breaches
- Physical Data Center Security – Make it better
- sub6 - Web App Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- The cost of a cyber attack – IT Governance Blog
- Home Depot in $27.84 million California hazardous waste, privacy settlement
- Patching Your Software Alone Is A Hassle. Not Patching Is A Risk
- Your IT shop is Ugly! Part 3 | Virtual Me
- Your IT shop is Ugly! Part 2 | Virtual Me
- Your IT shop is Ugly! Part 1 | Virtual Me
- Updated Oracle Roadmap Points To Post-11.4 Solaris Release Around 2020 - Phoronix
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- Rubrik Automated IT Helpdesk Ticketing v1 – Virtually Sober
- Intel X710 NICs Are Crap - The Lone Sysadmin
- Essential RHCE/RHCSA Study Guides – Codingbee
- Nobody is an expert at Oracle Database 18c | The ORACLE-BASE Blog
- Get IAM roles,policies and users-AWS CLI | geekdudes
- Make Your Program Slower With Threads - Marc's Blog
- Two traps in iostat: %util and svctm - Marc's Blog
- Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
- Latency lags bandwidth - Marc's Blog
- A layered approach to backups | Scott Gruby's Blog
- PowerCLI - VM and Host Metrics To Elasticsearch - EverythingShouldBeVirtual
- Ansible for Extreme Devices · Lindsay Hill
- Network Janitor | The Smartest Guy in the Room
- How to Setup iSCSI Server (Target) and Client (Initiator) on Debian 9
- Deeper Dive—Are the 3 major DRAM producers gaming the market? | FierceCable
- sigma - Generic Signature Format for SIEM Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR privacy notice – with documentation template example – IT Governance Blog
- Equifax facing historic data breach costs
- GDPR - Three Things You Can Do Now to Prepare
- Link Layer Discovery Protocol (LLDP): How it Works and Configuration
- vRetreat 2018: Zerto Virtual Replication 6.0 – Ather Beg’s Useful Thoughts
- Errata Security: Some notes on memcached DDoS